SecTor 2020, Canada’s Biggest Cybersecurity Event: Day Two


Attackers Shifting to CNP Exploits as EMV is Implemented for Credit Cards
Sometimes cybersecurity trends are counterintuitive. Credit and debit cards that use integrated circuit chips, EMV technology, were designed to be less vulnerable to fraud than the previous magnetic stripe only standard. But as more and more of us have EMV cards in our wallets, credit card fraud appears to be on the rise. EMV is an acronym for Europay, MasterCard,…


Are Windows Registry Fixers Safe?
Before I got into cybersecurity, I spent years as a technical support agent for Windows end users of Windstream, an American ISP. Although Windstream is an ISP, they also offered a general Windows client OS remote support service for their predominantly rural customers. Many of my malware-related tickets were to fix problems caused by users who installed Trojans. A lot…
Get the latest security news in your inbox.


UX Design: An Overlooked Aspect of Endpoint Security
People in information security know to heed the advice of Bruce Schneier. What we often forget to do, however, is heed the advice of Don Norman, who is considered to be the father of User Experience design. In fact, when Apple hired Norman in 1993 as an Apple Fellow and User Experience Architect he was probably the first person ever to…