Zyxel Fixes 0day in Network Storage Devices

Patch comes amid active exploitation by ransomware gangs Networking hardware vendor Zyxel today released an update to fix a critical flaw in many of its network attached storage (NAS) devices that can be used to remotely commandeer them. The patch comes 12 days after KrebsOnSecurity alerted the company that precise instructions for exploiting the vulnerability were […]

Read more
Is your phone listening to you?

Do social media listen in on our conversations in order to target us with ads? Or are we just a bit paranoid? A little test might speak a thousand words. We have all heard that our phones could be listening to our everyday conversations in order to then bombard us with targeted adverts. Is there […]

Read more
All About SASE: What It Is, Why It’s Here, How to Use It

Secure Access Service Edge is a new name for a known and growing architecture designed to strengthen security in cloud environments. Secure access service edge, also known as SASE (pronounced “sassy”), is a term popping up more in security conversations as businesses grapple with the challenge of secure networking in the cloud. SASE combines WAN […]

Read more
Four Canadian privacy watchdogs start investigation of facial recognition service

Four of Canada’s privacy commissioners have launched a joint investigation into whether a U.S. company’s facial recognition technology, which scrapes images from the internet for comparative purposes, violates privacy laws here. The federal privacy commissioner and commissioners in Alberta, British Columbia and Quebec said Friday they are investigating Clearview AI about whether the company is […]

Read more
Inflection Point I An interview with AltaML’s managing director about AI’s role in shaping Calgary’s digital future

“If you cannot get rid of the family skeleton, you may as well make it dance.” – George Bernard Shaw Calgary, the historical heart of the Canadian oil & gas industry, is at a once-in-an-epoch inflection point that will determine our destiny for this next millennium and beyond. Energy sources and technologies that have powered […]

Read more
Emotet Malware Rears Its Ugly Head Again

Enterprise VulnerabilitiesFrom DHS/US-CERT’s National Vulnerability Database CVE-2012-1093PUBLISHED: 2020-02-21 The init script in the Debian x11-common package before 1:7.6+12 is vulnerable to a symlink attack that can lead to a privilege escalation during package installation. CVE-2012-0828PUBLISHED: 2020-02-21 Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause […]

Read more
Landing that dream data scientist position

The data scientist role emerged as a sought-after position during the 2010s. Demand for data scientists is continuing to grow. Mr. Khaled Hasna, a technical recruiter with IT-IQ Inc. observes, “significant growth in demand for data science in the finance and insurance sectors – anywhere where risk assessment is required.” The numbers back this up. […]

Read more
NRC Health Ransomware Attack Prompts Patient Data Concerns

The organization, which sells patient administration tools to hospitals, could not confirm whether patient data was accessed. A Feb. 11 ransomware attack targeting NRC Health has driven concerns about the security of patient data stored on the organization’s servers. NRC Health manages patient survey systems and works with 75% of the 200 largest hospital chains […]

Read more
Top