Internet Safety
Backing up your device
Maintaining online security requires regularly backing up your device. The issue? Although it’s simple to say, doing it can be challenging. There are many advantages to backing up your devices. It guarantees you’ll still have access to crucial files, such as financial records or images, even if you lose your device, unintentionally delete files, or…
Read MoreQuizzes, online status updates and invites
I’d like to discuss social media quizzes, online status updates and invites. Let’s start with a topic that just fascinates a lot of my social media friends. I can’t understand why they want to know which Disney horse resembles them, or which movie star resembles them. When they are on one of these sites, it…
Read MoreWhy and how hackers and scammers pick you
Let’s talk about how and why and how hackers and scammers pick you. You shouldn’t take it too personally because hackers and scammers often create a software script that indiscriminately spreads out to the Internet, searching for specific versions of the vulnerable software. And if you are vulnerable because you didn’t stay up to date,…
Read MoreHow to know if your phone is hacked?
Maybe you’ve noticed it, or you haven’t, but phone hacking is rising. It’s not too surprising. The pandemic turned the office worker into a mobile worker, primarily working from the comforts of home, a fast and almost overnight move. The urgency to adapt left many companies unprepared and, in many cases, without proper cybersecurity protection—the perfect…
Read MoreJob Application Scam
A university student fell victim to a sophisticated fake job application scam email. The hacker, searching AngelList social media site, noticed that the victim’s profile revealed that she had a background in IT. Easy enough, the hacker found their email address and sent a fake job offer from the well-known cybersecurity company Splunk. She did…
Read MoreBack-to-school requires parents to be even more vigilant
One thing I’ve always been passionate about is helping parents keep their children safe online. In 2016, driven by my passion, I developed Internet Safety University to help parents protect their kids online. As kids prepare for school, I’d like to remind parents that back-to-school requires parents to be even more vigilant. Reports vary, but…
Read MoreBusinesses need to prioritize trust
While you would not expect a technology company to discuss topics such as trust, I recommend businesses need to prioritize trust. This blog post will concentrate on how technology and processes can help your business build trust with employees and customers. Trust is confidence in the high probability that a person or organization will spark…
Read MorePassword best practices
With today’s business world reliant on digitalization, using technology in your organization is unavoidable. However, technology can undeniably give your business an advantage in competitive markets. There are many troublesome areas that require some password best practices. Password protection is the best place to ramp up your cybersecurity. Setting a password to secure an entity’s…
Read MoreOnline scams are rising in Canada
As more Canadians worked, shopped and socialized online during the pandemic, online scams are rising in Canada as cybercriminals have seized their opportunity. A record cost of $380 million to online fraud occurred in 2021. Ontario led the country, swindled out of $313 million or $3,000 per incident. What is more, that’s twice the volume…
Read MorePhishing and vishing
Phishing and vishing attacks increased to a record number in the first quarter of 2022, surpassing 1 million. Not surprisingly, the financial sector accounts for the highest number of phishing attacks, representing 23.6 percent of all attacks. As of March 2022, companies experienced 1,025,968 phishing attacks, according to the Anti-Phishing Working Group (APWG). The second-highest…
Read MoreCyber Security Today: Week in Review
To listen to the full podcast and read the transcript, visit Cyber Security Today: Week in Review Howard Solomon: Joining us now from Montreal is Terry Cutler. Let’s start with the Microsoft report on Russian cyber activity against countries supporting Ukraine. The report has two themes: Russian intelligence agencies are increasing their espionage activities against governments…
Read MoreA woman’s educated response saves her from a scam
A woman’s educated response saved her from falling victim to a COVID-19 scam. The impersonator scammer, hoping to seize an opportunity, targeted her while she was unwell with Covid-19. Chantel, from Victoria, Australia, received a text message from her Medicare provider. “Medicare: You have been in close contact with someone who has contracted Omicron. You…
Read MoreThe Tinder Swindler
The Tinder Swindler is a Netflix film about a man posing as a wealthy businessman who conned women out of millions of dollars. However, the film follows a group of women who attempt to hunt down the swindler and get their money back. The film depicts a typical romance scam. A scammer creates a bogus…
Read MoreAct Respecting Cyber Security
The Canadian government has proposed a bill that would force companies to establish or enhance their cybersecurity defences. If not—face expensive fines. In a press release, Marco Mendicino, Minister of Public Safety, introduced Bill C-26, An Act Respecting Cyber Security (ARCS). As a result, the law would affect the financial, telecommunications, energy, and transportation sectors.…
Read MoreTerry Cutler on CBC talks about Fraudster App
I spoke about my new app called Fraudster this week with Sabrina Marandola on CBC’s Let’s Go Fraudster delivers important fraud alerts via push notifications and timely events. In addition, the app delivers distinctive insight and incisive analysis of BOTH online and offline threats targeting businesses and individual consumers. As an innovative free app that…
Read MoreSniffing out sensitive data
Sniffing out sensitive data is the act of intercepting and monitoring sensitive data on private and public networks. Generally, software and hardware devices sniff out data packets through unencrypted email messages, passwords, and financial information. Ethical hackers use sniffing to understand a network’s setup and user behaviour. Further, companies can use these insights to improve…
Read MoreAussie woman becomes a victim of property scam
A West Australian woman buying property has lost more than $700,000 as a result of a property scam. She received a phishing email from someone claiming to be her agent, asking for a large bank deposit to seal the deal. The scammer pretended to be an employee of her agency. At the same time, the scammer…
Read MoreSextortion scams on the rise
An escalating sextortion scam that began in February ended with the suicide of a 17-year-old high school senior, marking a horrific end to what law enforcement is calling an explosion in sextortion scams. Someone posing as a girl struck up an online conversation with California resident Ryan Last. Soon, the girl sent a nude photo…
Read MoreFRAUD ALERT: Fake Scotia Bank Phishing attack via text message
Please be vigilant. The link in the text message has no mention of the bank name in it. If you click on it, you’ll end up on a fake bank website where you could accidently give away your banking credentials to cyber criminals. Recommended steps: Delete or ignore the text message.
Read MoreRansomware: Week in Review May 27, 2020
Howard: Ransomware gangs often rebrand as law enforcement agencies crack down on them. But this week came news that the Conti gang, known for attacking big companies and government departments, is retiring its brand to instead work closely with other gangs. What do you make of this news? Terry Cutler: We’ve heard this before — a…
Read MoreThe sugar daddy scam
The sugar daddy scam is a growing trend where cash-strapped young women and men claim to be sugar babies. They look for sugar daddies or mothers who will pay their bills. We know this type of fraud as advance-fee fraud, the Nigerian prince scam, or the 419 scam. Sugar daddies and sugar mommies usually meet…
Read MoreZelle scam on the rise
Zelle is a peer-to-peer payment app that makes it easy to transfer money. However, it’s also a way for scammers to defraud you. Welcome to the Zelle scam. A US-based digital payments network, Zelle is owned by Early Warning Services, LLC, a private financial services provider owned by Bank of America, Trust, Capital One, and…
Read MoreYour employees are your biggest threat
Cybercriminals who want to exploit a business’ network vulnerabilities are always searching for access. The only way to counter these hackers is by deploying a strong cybersecurity posture. Additionally, companies should build a comprehensive security solution. Nevertheless, you may overlook the weakest link in your battle against cyber threats—your employees. Businesses today must enhance their…
Read MoreRemote access scams
The latest financial scam involves hackers posing as investment advisors to entice unsuspecting victims. With remote access scams, a standard IT support tool for screen sharing, the fraudster advisors plant malware and gain access to their victims’ bank login information. In fact, Fraudsters exploit people’s lack of technological understanding in remote access scams to trick…
Read MoreMontreal woman learns a lesson after Instagram was hacked
Montreal’s Amanda Polito’s Instagram was a positive part of her day for nine years. Now, it’s a source of stress and anxiety. Polito’s Instagram was hacked account was recently hacked. She says the scammer is now masquerading as her, even sending her taunting messages and offers to buy cryptocurrency. But complaints to the social media platform…
Read MoreLong-term romance scam
During the long-term romance scam, scammers build trust with a victim over the years. The scammer is a non-committal pen pal, friendly chat buddy—Unlike the common quick-hit, grab-and-dash love scam. This scammer is essentially a long-term catfisher. The payoff? Thousands of dollars are bilked from the victim. But before that, the scammer moves slowly. Suddenly,…
Read MoreRomance scams increasing
Romance scams continue to increase. Over 323 million people worldwide use dating apps on their mobile phones. Dating app revenues have increased every year since 2015, reaching $5.61 billion in 2021. Further, increases in usage will reach USD 11.03 billion by 2028. Hackers are mainly targeting those looking for love online. According to the Federal…
Read MoreJob offer scams
With job offer scams, a general rule is that you’re probably right if you think the job offer isn’t genuine. Canada’s Better Business Bureau reported that in 2019, 14 million victims paid out $2 billion in direct losses to fake recruiters. Further, the problem doubled in 2020 during the peak of COVID-19. Youth between the…
Read MoreCryptocurrency scams
The growing popularity of cryptocurrency has seen an increase in cryptocurrency scams. A cryptocurrency is a digital currency that exists virtually and uses cryptography to secure transactions. It doesn’t rely on the Go-Betweens, such as brokerages, exchanges, banks, or governments. In fact, a peer-to-peer network, known as a blockchain, monitors and organizes the wallet. Cryptocurrency…
Read MoreHacking the Bluetooth
The Bluetooth handshake occurs when two devices pair up to establish a connection, such as your phone and car. Hackers in the area use specialized software and hardware to discover vulnerable Bluetooth-equipped devices. The primary use of Bluetooth involves connecting multiple devices without using cables or wires. Further, Bluetooth relies on short-range radio frequency, and…
Read MoreLockBit 2.0
LockBit 2.0, unlike other Ransomware, spreads on its own. It confuses defence systems and hooks up with other Ransomware on other networks, for instance. It functions in this manner: The attacker infects a single host and sets it loose. As a result, it is embedded in a network and spreads its encrypting code across devices.…
Read MoreFake charity scams exploits Ukraine
With Russia’s invasion of Ukraine, charitable organizations are mobilizing for Ukraine and its citizens. But fake charity scams are exploiting our sympathy for Ukraine’s situation. According to the Wisconsin Department of Financial Intuitions (DFI), the scams are increasing. The department suggests consumers to some research before donating money to any charity. “Scammers see tragedies as a…
Read MoreBack to Ransomware basics
Ransomware is a form of online extortion targeting businesses and individuals. And as we move further into 2022, it is becoming more of a problem. Imagine you show up to work as the company CEO and find out that all your corporate data is unusable, for instance. Moreover, the data backups are now encrypted and…
Read MoreRansomware attacks continue
Ransomware is a form of online extortion targeting businesses and individuals. And as we move further into 2022, it is becoming more of a problem. For instance, imagine you show up to work as the company CEO and find out that all your corporate data is unusable?. The data backups are now encrypted and useless. …
Read MoreCyber Security Today, Week in Review for Feb. 18, 2022
I’ll be joined by guest commentator Terry Cutler of Montreal’s Cyology Labs to discuss some of the news from the past seven days. Howard: We’re going to talk about a couple of other stories that I came across. Researchers at Crowdstrike issued their annual global threat report this week and among the findings: It took hackers an average…
Read MoreHacker’s Magic Card Trick
Just like a magician, when a Cyber Criminal breaks into your network, he’ll steal your sensitive information via a deception technique called misdirection. Let me demonstrate with this magic trick !
Read MoreWhat to do Before during and After a Ransomware Attack
Does your staff have too much access?
How much sensitive information is on your computer?
Your Patch Management might be Broken
Is your IT department looking out for your Cybersecurity?
The problem with bad passwords
How your Company Can Get Started With Cybersecurity
Based on conversations I’ve had with executives at conferences, emails, YouTube comments, phone calls and meetings, I believe that just getting your company started with a Cybersecurity program is complex enough. Let me explain how you can get started today !
Read MoreWhat Pitfalls To Watch Out For From 2 Cybersecurity Experts to Protecting Yourself or Your Business
I got the chance to sit down with Cybersecurity Expert Eric Parent to discuss what should be done with Social Insurance Numbers as the main identify of a person. We also talk about other challenges we see in our industry including basic problems and how you can avoid them.
Read MoreHow to better protect yourself from data hacking
Credit card company Capital One’s security breach is affecting millions of Canadians. Security expert Terry Cutler joins Global’s Andrea Howick to discuss how we can better protect ourselves — especially in light of the recent Desjardins data breach.
Read MoreHow to protect yourself from Capital One Data Breach
You may have heard about the Capital One data breach, so here’s some tips to avoid getting frauded.
Read MoreTerry Cutler and Frank Baylis discuss phishing
Cybersecurity threats occur on a daily basis. According to a recent study, Canada had the third most cyber incidents in the world in 2018. I sat down with Terry Cutler, a Canadian cybersecurity expert to talk about these threats. Please watch this one minute clip on the subject of phishing.
Read MoreTeaching On Another Level 20,000 strong
VP of Cybersecurity at SIRCO, Founder at Internet Safety University, Founder and CEO at Cyology labs, Student and Teacher of emerging tech, there’s little that Terry Cutler does not do. Oh yeah…did I mention has taught over 20, 000 people with his class called ” Insider secrets from an Ethical Hacker on Internet Safety ”…
Read MoreCurrent developments and challenges in the cybersecurity industry
At the Ottawa Cybersecurity Meetup on 22 Nov 2018, TERRY CUTLER, Information Security Strategist & Certified Ethical Hacker, talks about the current developments and challenges in the cybersecurity industry. He also offers practical career advice and professional security tips.
Read MoreHow to create a strong password
Let’s talk about a problem that’s plagued the IT world for generations, which is passwords. So many people create such terribly weak passwords that can be broken in minutes. The problem is the average person has between 12 and 30 different passwords, which includes pin codes to bank accounts, to your ATM machines, and passwords…
Read More