fbpx
Paladion’s John Daniele, at his firm’s cybersecurity monitoring centre in Oakville, Ont., says Canadian companies tend to lag their U.S. counterparts in spending on data security.(J.P. Moczulski/The Globe and Mail) That message from an Eastern European stranger who would like to make your acqua...
WannaCrypt/WannaCry ransomware has affected Windows XP systems across the globe.Image: Cisco Talos Factories, businesses and governments around the world are coming to terms with the largest ransomware attack observed in history. Organisations across the globe are coming to terms with the massive ra...
Wearables for the wrist generally fall under fitness or fashion with little in the way of modularity or expandability. The Nex Evolution is unlikely to turn heads for how it looks, but rather for what it can do. Originally a crowdfunded device from Montreal-based Mighty Cast, this band carries ...
Too many domain names with non-Latin letters are still shut out of the global Internet economy. ompanies that do business online are missing out on billions in annual sales thanks to a bug that is keeping their systems incompatible with Internet domain names made of non-Latin characters. Fixing it c...
Ransomware is a form of malicious software that locks up the files on your computer, encrypts them, and demands that you pay to get your files back. Wanna Decryptor, or WannaCry, is a form of ransomware that affects Microsoft’s Windows operating system. When a system is infected, a pop up window a...
If you’re buying a used phone, there’s always been one critical thing to look out for: whether the device is stolen. And finding that out is getting a bit easier today. The US wireless industry, through its trade group the CTIA, has launched a tool called the Stolen Phone Checker, which let...
File photo. (REUTERS/Kacper Pempel ) Any car owner with a keyless entry and ignition system, be warned: Chinese security researchers have proven that with equipment costing about $25, hackers could easily open car doors remotely from up to 1,000 feet away, start the cars' engines and drive away. Sec...
I just watched “The Circle”, a thriller about a computer company which uses internet connectedness to eradicate privacy in the name of “transparency” and “democracy”. The film is fictional, but the conflict between privacy and internet capitalism is real. The giants of the computer world...
  • Saturday, 13 May 2017 21:06
  • By:
Robocalls flooding your phone? Here’s how to stop them – or get a bit of revenge An unfamiliar number appears on your cellphone. It is from your area code, so you answer it, thinking it might be important. There is an unnatural pause after you say hello, and what follows is a recording telling y...
An exterior view shows the main entrance of St Bartholomew's Hospital in London, one of the hospitals whose computer systems were affected by a cyberattack, Friday, May 12, 2017.(Matt Dunham/AP Photo) A global cyberattack leveraging hacking tools widely believed by researchers to have...
The computers are watching. Imagine if you lost your keys and instead of fishing around in the couch cushions, you could just pull out your phone and search for them. Just a quick, textual query with a quick response that they're on your desk, you doofus. This is not only possible; it's possible now...
Security flaws smash worthless privacy protection Analysis To protect mobile devices from being tracked as they move through Wi-Fi-rich environments, there's a technique known as MAC address randomization. This replaces the number that uniquely identifies a device's wireless hardware with rando...
Net neutrality, the idea that internet service providers must treat everything equally, has been described as ‘the first amendment of the internet’. Photograph: Juice/REX/Shutterstock US campaigners rejoiced in 2015 when ‘net neutrality’ enshrined the internet as a free and level playing fie...
  • Friday, 12 May 2017 21:16
  • By:
How private is your iPhone, and the personal data stored on it? We examine the iPhone's built-in privacy measures, explain how to protect your iPhone privacy, and argue that Apple is more deserving of your trust - and your data - than Google. Latest: iMessage's end-to-end encryption has been improve...
Original Story, 5/9/17 at 4:11 p.m: For serious Starbucks go-ers, their mobile app makes paying for your Grande iced coffee easy as can be - but users who chose to link their Starbucks account to their banks are finding themselves victims of a major scam. A reporter at Buzzfeed explained that l...
The job posting was for a personal assistant. It paid $350 a week and would involve picking up mail, dropping packages off at the post office and some shopping. Kaya was 31, had just returned to Toronto after working overseas and was desperate to make some money, so she replied to the Craigslist pos...
Recently I handed over the keys to my email account to a service that promised to turn my spam-bloated inbox into a sparkling model of efficiency in just a few clicks. Unroll.me’s method of instant unsubscribing from newsletters and junk mail was “trusted by millions of happy users,”...
The infamous hacktivist group Anonymous has released a chilling new video — urging people across the globe to “prepare” for World War 3 — as the US and North Korea continue to move “strategic pieces into place” for battle....
Listen to computer virus pioneer John McAfee speak on the potential lack of security that comes from cameras and microphones on cell phones. USA TODAY DENVER — Computer security pioneer John McAfee pulls out his cell phone to stare at a notification on the screen. “It says something changed...
  • Wednesday, 10 May 2017 17:13
  • By:
The new malware emerged exploiting vulnerabilities that a researcher reported in March Over 100,000 internet-connected cameras may be falling prey to a new IoT malware that’s spreading through recently disclosed vulnerabilities in the products.   The malware, called Persirai, has been found i...
Think your password is secure? You may need to think again. People's perceptions of password strength may not always match reality, according to a recent study by CyLab, Carnegie Mellon's Security and Privacy Institute. For example, study participants expected ieatkale88 to ...
A decade-old vulnerability in Intel chips has been discovered, leaving thousands of Windows computers susceptible to hijacking and remote takeovers. Intel disclosed the critical bug last week and the weakness appears to be in the Active Management Technology (AMT) feature used by IT administrators t...
Back in February, we learned from a security researcher that various iOS apps can secretly leak login data and other personal information to hackers that know how iOS works, and how to take advantage of various flaws. Three months later, it looks like many of these apps, including mobile b...
One of the most popular passwords in 2016 was "qwertyuiop," even though most password meters will tell you how weak that is. The problem is no existing meters offer any good advice to make it better—until now. Researchers from Carnegie Mellon University and the University of Chicago have just unve...
An unusually sophisticated identity phishing campaign appeared to target Google's roughly 1 billion Gmail users worldwide, seeking to gain control of their entire email histories and spread itself to all of their contacts, Google confirmed Wednesday.   The worm — which arrived in users' inbo...

airs logo

Association of Internet Research Specialists is the world's leading community for the Internet Research Specialist and provide a Unified Platform that delivers, Education, Training and Certification for Online Research.

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.

Follow Us on Social Media