

A Welcome Reset for Citizen Privacy
Canada’s Public Consultation on National Security: The notion that we are being watched digitally has, seemingly overnight, become something many people now accept as a fact of life in the modern, post-Snowden world. Much of the news around citizen privacy, as always, has been focused on the US, but are we on the sidelines? Canada is an active participant in the five-eyes program, has rolled out the now politically toxic Bill C-51, and as members of NATO, NORAD, and enough ac


The CyberWire Daily Podcast
The CyberWire Daily Podcast is a look at what's happening in cyberspace. It provides a clear and concise summary of the news and offers commentary from industry experts. In this podcast we hear about "Rasputin," a cybercriminal selling US Election Assistance Commission credentials. US investigation of Russian influence operations continues, with promises of eventual retaliation (nose-thumbing from Moscow received in response). UK and EU officials worry about Russian meddling


Expert advice for the one billion hacked in Yahoo mega data breach
A catastrophic case of déjà vu for Yahoo, as a second mega data breach is disclosed by the company. This one is even worse – with one billion user accounts reportedly compromised in what has become the biggest data breach of all time. ‘Unfathomable’ and ‘unprecedented’ are just some of the adjectives being used by security pros today, having woken up to the news this morning of asecond Yahoo mega data breach. This latest Yahoo mega data breach, combined with the already discl


IP Bill: Tech Firms Attempt to Offer Respite from Surveillance
Now that the Investigatory Powers Bill has been passed, tech firms are looking for ways to offer customers ways to circumvent the spying associated with the law. Now that the Investigatory Powers Bill has been passed, tech firms are looking for ways to offer customers ways to circumvent the spying associated with the law. The Investigatory Powers Bill was approved by the House of Lords on 19 November and is expected to become law before the end of 2016. Parts of the law, mand


Investigatory Powers Bill one step closer to becoming law
The Investigatory Powers Bill has passed its third reading in the House of Lords. The House of Lords did suggest some amendments to the bill, which means the bill will be thrown back to the House of Commons for a final 'look over', and is expected to become law by the end of 2016. The Investigatory Powers Bill (IP Bill) has passed its third reading in the House of Lords. The 300 page document has completed its Parliamentary process, and is expected to become law by the end of


Artificial Intelligence Creates its Own Encryption
Researchers from Google's Brain division have released an academic paper which details how they were able to get neural networks to create their own encryption standard, and communicate between each other. Google's Brain researchers have released a paper named “Learning to protect communications with adversarial neural cryptography” which has detailed how, when tasked, its AI technology has been able to create its own cryptography standard. Jacob Ginsberg, senior director at


Google AI Can Create Its Own Encryption
Google has shown that artificial intelligence has the ability to create its own cryptography standard—a step in the right direction in automating encryption. In an academic paper, the internet behemoth’s Google Brain team details the creation of three neural networks (Alice, Bob and Eve). The team assigned them individual tasks: Alice was asked to send encrypted messages to Bob, who then was tasked with decrypting them. Eve played the role of the hacker, and was asked to crac


Facebook Went Secret But Its Facebook
I share insights, talk fears, and discuss the risks with renown cybersecurity expert and certified ethical hacker Charles Tendell, on The Charles Tendell Show. You may not have noticed. But Facebook released it “Secret Conversation” for its messenger app. But its Facebook so really how private is it? Jacob Ginsberg of Echoworx joins the conversation. LISTEN TO PODCAST ... #informationsecurity #encryption #privacy


Email Security: These Steps Can Stop Hackers
Your email account contains the keys to your kingdom. Think about all the personal information that's in there. Bank records, such as statements and receipts. Credit card bills. Your name and address. Even passwords if you shared them with someone. The news is filled with the aftermath of email hacks. Hackers penetrated the email accounts of John Podesta, Hillary Clinton's presidential campaign chairman; the Democratic National Committee; and former Secretary of State Colin P


Solving the Encryption Conundrum in Financial Services
kThe encryption debate has captured the world’s attention. And coupled with the inevitability of another notable data breach, awareness of encryption as a tool to mitigate threat is at an all-time high. What does this mean for FinServ? Encryption has gone mainstream. In March this year, WhatsApp announced that it would encrypt all users’ communications. Viber and Facebook soon followed suit. In one fell swoop, these three companies shifted the user base of strong encryption f