Cyber attack
Promutuel Insurance is back in service after a cyberattack
Technology
2 weeks ago
Promutuel Insurance is back in service after a cyberattack
Promutuel still does not know what data could have been compromised in the computer attack. (Photo: 123RF) Promutuel Insurance’s computer…
Communauto car-sharing service victim of a cyberattack
Technology
3 weeks ago
Communauto car-sharing service victim of a cyberattack
(Photo: Communauto) The holiday season has not been easy for the Montreal carsharing service Communauto, which was the target of…
A “cybersecurity incident” at Aurora Cannabis
Technology
3 weeks ago
A “cybersecurity incident” at Aurora Cannabis
Posted ago 0 minutes (Photo: 123RF) Aurora Cannabis (ACB) said Monday it suffered a “cybersecurity incident” during the holiday break.…
A major cyberattack still ongoing in the United States
Technology
December 17, 2020
A major cyberattack still ongoing in the United States
(Photo: Getty Images) A large-scale cyberattack on several government departments discovered last weekend in the United States is still ongoing…
SQ police officers collateral victims of a cyberattack
Technology
October 29, 2020
SQ police officers collateral victims of a cyberattack
Information technology Published on 10/28/2020 4:09 PM (Photo: 123RF) Thousands of police officers and ex − police officers from the…
August cyberattacks: 48,500 CRA users affected
Technology
September 17, 2020
August cyberattacks: 48,500 CRA users affected
Information technology Posted ago 2 minutes (Photo: The Canadian Press) After a month of investigation, the federal government realizes that…
A wave of Magecart attacks detected for the start of the school year
Technology
September 15, 2020
A wave of Magecart attacks detected for the start of the school year
Back to school, government and business firmly believe in the long-awaited economic recovery, so do cybercriminals. The Sansec company, which…
The vast majority of cyberattacks are believed to be used to “mine” cryptocurrency
Technology
September 14, 2020
The vast majority of cyberattacks are believed to be used to “mine” cryptocurrency
A study of cyber attacks recorded over one year on cloud servers reveals that the vast majority of hackers target…
Blindside: when speculative execution allows ASLR to be bypassed
Technology
September 14, 2020
Blindside: when speculative execution allows ASLR to be bypassed
Academics have developed a new technique to attack secure computer systems by abusing speculative execution, a processor mechanism that is…
BLURtooth vulnerability allows overwriting of Bluetooth authentication keys
Technology
September 11, 2020
BLURtooth vulnerability allows overwriting of Bluetooth authentication keys
The organizations behind Bluetooth wireless technology have just released tips on how device vendors can mitigate a new attack on…