Scam iOS apps promise fitness, steal money instead

Fitness-tracking apps use dodgy in-app payments to steal money from unaware iPhone and iPad users Multiple apps posing as fitness-tracking tools were caught misusing Apple’s Touch ID feature to steal money from iOS users. The dodgy payment mechanism used by the apps is activated while victims are scanning their fingerprint seemingly for fitness-tracking purposes. There […]

Read more
CyberwarCon – focusing on the impact of cyber-badness

A welcome return to the hacker conferences of yesteryear There used to just be hacker conferences, but now the societal impact of increasingly connected systems seems much higher, so specialty conferences are popping up. Seeking to bring policy-makers and influencers together, where could be a more appropriate location for CyberwarCon than Washington D.C.? Notably, it’s […]

Read more
Executive talent risks in the Government of Canada

John Glowacki is the former chief operating officer of Shared Services Canada.  While most of my focus here is on IT and digitization efforts, many of the issues also apply to non-IT areas of the Government, making the issues even more pervasive and strategic.  The Government of Canada (GC) generally has qualified technical staff to […]

Read more
What the Marriott Breach Says About Security

We don’t yet know the root cause(s) that forced Marriott this week to disclose a four-year-long breach involving the personal and financial information of 500 million guests of its Starwood hotel properties. But anytime we see such a colossal intrusion go undetected for so long, the ultimate cause is usually a failure to adopt the […]

Read more
Top