Cyber ​​attack

Promutuel Insurance is back in service after a cyberattack
Technology

Promutuel Insurance is back in service after a cyberattack

Promutuel still does not know what data could have been compromised in the computer attack. (Photo: 123RF) Promutuel Insurance’s computer…
Communauto car-sharing service victim of a cyberattack
Technology

Communauto car-sharing service victim of a cyberattack

(Photo: Communauto) The holiday season has not been easy for the Montreal carsharing service Communauto, which was the target of…
A “cybersecurity incident” at Aurora Cannabis
Technology

A “cybersecurity incident” at Aurora Cannabis

Posted ago 0 minutes (Photo: 123RF) Aurora Cannabis (ACB) said Monday it suffered a “cybersecurity incident” during the holiday break.…
A major cyberattack still ongoing in the United States
Technology

A major cyberattack still ongoing in the United States

(Photo: Getty Images) A large-scale cyberattack on several government departments discovered last weekend in the United States is still ongoing…
SQ police officers collateral victims of a cyberattack
Technology

SQ police officers collateral victims of a cyberattack

Information technology Published on 10/28/2020 4:09 PM (Photo: 123RF) Thousands of police officers and ex − police officers from the…
August cyberattacks: 48,500 CRA users affected
Technology

August cyberattacks: 48,500 CRA users affected

Information technology Posted ago 2 minutes (Photo: The Canadian Press) After a month of investigation, the federal government realizes that…
A wave of Magecart attacks detected for the start of the school year
Technology

A wave of Magecart attacks detected for the start of the school year

Back to school, government and business firmly believe in the long-awaited economic recovery, so do cybercriminals. The Sansec company, which…
The vast majority of cyberattacks are believed to be used to “mine” cryptocurrency
Technology

The vast majority of cyberattacks are believed to be used to “mine” cryptocurrency

A study of cyber attacks recorded over one year on cloud servers reveals that the vast majority of hackers target…
Blindside: when speculative execution allows ASLR to be bypassed
Technology

Blindside: when speculative execution allows ASLR to be bypassed

Academics have developed a new technique to attack secure computer systems by abusing speculative execution, a processor mechanism that is…
BLURtooth vulnerability allows overwriting of Bluetooth authentication keys
Technology

BLURtooth vulnerability allows overwriting of Bluetooth authentication keys

The organizations behind Bluetooth wireless technology have just released tips on how device vendors can mitigate a new attack on…
Back to top button

Adblock Detected

Please consider supporting us by disabling your ad blocker