AI Scams Targeting Children: A Terrifying Reality

A chilling revelation has come to light: criminals are harnessing the power of AI  scams to hack into children's social media accounts to clone their voices.

A chilling revelation has come to light: criminals are harnessing the power of AI  scams to hack into children’s social media accounts to clone their voices. These online scams have frightening implications. There is an urgent need for heightened awareness and security measures. Security experts have warned about even the most basic scammers employing readily…

Read More

Unwind Securely: Safeguard Your Digital Footprint on Vacation

Contacting friends and family would be much more difficult without the internet and social media platforms. After all, we can enjoy several significant moments online, protected behind our screens. Online connections have enabled us to remain in touch, never missing a minute, whether attending your friend’s virtual wedding or watching your favourite cousin’s newborn take…

Read More

Holiday Hacks: Protecting Your Browser Amidst Festive Cyber Fervour

As the holiday season approaches, digital transactions transform into a bustling marketplace blending festive cheer with lurking cyber threats. Amidst the joyous celebrations, it’s paramount to fortify our digital defences beyond the conventional cues of cyber intrusion. Here, we delve deeper into safeguarding your website browser, unveiling lesser-known threats often lurking beneath the surface. As…

Read More

The Elusive Tactics of Star Blizzard

A shadowy group of hackers has emerged onto the global stage, orchestrating a sophisticated global spear phishing attack reportedly linked to the Kremlin. Known under an array of pseudonyms—Star Blizzard (formerly SEABORGIUM), Callisto Group, TA446, COLDRIVER, TAG-53, and BlueCharlie—this clandestine unit employs a cunning strategy. Their method? Covertly embedding seemingly harmless links within legitimate websites…

Read More

Unveiling the Digital Grinch: Fake Affiliate Scams, Giveaways, and Followers

As the holiday spirit blankets social media, lurking beneath are cyber villains wielding deceptive tactics. Discover the dark underbelly of the festive season: affiliate scams infiltrating platforms with stolen credentials, baited fake giveaways masquerading as gifts, and the rise of counterfeit followers.  These schemes, designed by digital impostors, prey on our trust and eagerness. Unwary…

Read More

Beware of Rental Scams: Protect Yourself from Fraudulent Listings

As the demand for rental properties increases, so does the risk of falling victim to rental scams. Exercise caution when searching for rental accommodation, as scammers have become increasingly sophisticated in their tactics. By altering legitimate ads or creating fake ones, these scammers aim to deceive unsuspecting individuals into providing personal information, security deposits, and…

Read More

Unmasking the even Darker Side of Romance: AI Hackers in the World of Love

In online romance, finding love has become a precarious dance with the unknown. As technology evolves, so do the tactics of scammers and fraudsters. In recent years, a new sinister force has emerged: AI hackers infiltrating the world of romance scams. These sophisticated virtual predators employ artificial intelligence (AI) to deceive unsuspecting victims, leaving shattered…

Read More

How AI Empowers Everyday Consumers by Safeguarding Against Hackers

Artificial Intelligence (AI) is stepping in as a powerful ally to protect everyday consumers from the clutches of hackers. This blog post will explore how AI plays a pivotal role in safeguarding individuals, ensuring their digital privacy, and enhancing their online security. Robust Threat Detection: Enhanced Email and Web Security: Personalized Behavioral Analysis: Intelligent Password…

Read More

Swiftly Outsmart Ticket Scammers: Protecting Yourself During The Eras Tour 

…or any high-profile tour or event. As the highly anticipated Taylor Swift Canadian concert tour approaches, fans are hunting for tickets. But amidst the excitement, staying vigilant and protecting yourself from ticket scams is crucial. Let’s learn from a cautionary tale and gain valuable advice to ensure a scam-free ticket-buying experience. Picture this: A fan,…

Read More

The Fine Print: What You Need to Know Before Signing Up for a Free Trial

The lure of a free trial can leave you bound by unexpected charges and subscriptions. Social media ads promoting weight-loss pills, anti-wrinkle serums, or muscle-enhancing supplements often use high-pressure sales tactics, countdown timers, and celebrity endorsements to entice you to sign up for a trial offer. However, by accepting these offers, you could be charged…

Read More

Scamming the Scammers: Creative Ways to Turn the Tables on Won Scams

Imagine you receive a message claiming you’ve won a prize, whether it’s a vacation, cruise, lottery, or sweepstakes. The person contacting you seems ecstatic about your winnings and can’t wait for you to claim them. However, be wary of scams like these that are designed to trick you into giving away your personal information or…

Read More

Don’t Let Tax Season Turn into Identity Theft Season

As we embrace the convenience of online tax filing, we must prioritize the security of our personal and financial information. With cybercriminals and hackers constantly on the prowl for sensitive data, the risks of falling prey to online fraud are higher than ever, particularly during the tax season. Considering this, we must be mindful of…

Read More

The Truth About Online Reviews: How to Protect Yourself from Fraudulent Feedback

In today’s e-commerce platforms, we come across incentivized, sponsored, or fraudulent reviews, creating a confusing experience for online shoppers. This problem becomes more complicated when we consider the impact of the volume and sentiment of consumer reviews. Online customer reviews are powerful tools for businesses, allowing them to build trust with potential customers and improve…

Read More

The Amazon Prime Scam You Need to Know About: Stay Safe Online

Amazon Prime, the popular subscription service that offers fast shipping and streaming of music and movies, is being targeted by cybercriminals in a new phone scam. There has been a rise in Prime members receiving phone calls from con artists pretending to be Amazon. The first step in the scam is to determine if the…

Read More

Cyber Attack Alert: How to Stay Safe on Gmail with Chrome

If you have a Gmail account and use Chrome on your PC, beware of a dangerous new attack. The attack involves a fake Chrome browser extension called AF that infects computers and steals data from Gmail inboxes. This blog will tell you about the new cyber attack alert: how to stay safe on Gmail with Chrome.…

Read More

Avoid Paycheck Scams Like a Boss

Paycheck scams are a type of fraud in which scammers target individuals or businesses by offering fake job opportunities and promising high salaries and flexible schedules. These scammers often use phoney job postings on job boards and social media platforms or send unsolicited job offers via email or text. Once the victim accepts the job…

Read More

Goodbye TikTok? Canadian Government Takes Aim at Popular App

TikTok is a Chinese-based and owned social media app that has gained immense popularity among young people worldwide, particularly during the COVID-19 pandemic. The app allows users to create short videos and share them with others, but there are growing concerns about the cybersecurity risks associated with using TikTok.  Earlier this week, the Canadian government…

Read More

Eight Ways Red Flags Can Keep You Safe Online

Internet safety is always on our minds, and for a good reason. It is an excellent resource for learning, connecting with friends and family, and finding information. It can also be a dangerous place. That’s why it’s essential to be aware of the red flags that warn someone may be in danger online. Some of…

Read More

How older adults can use social media safely

Social media enables us to share information, interests, and ideas with friends and families. Navigating social media is not always easy, but older adults shouldn’t refrain from using it. If you protect yourself and your accounts from common cyber threats, you are ready to enjoy all the positives social media can offer! Protect yourself with…

Read More

Payment app scams are on the rise again

In 2021 and the first half of 2022, banks in the US reported 192,000 cases, or one in ten, of crimes perpetrated on customers using the payment app Zelle. Less than 3,500 clients got refunds out of all those cases.  Venmo, Cash App, and other apps like Zelle make it simple to transfer funds to…

Read More

Romance Scam that Goes for the Whole Hog

Cyber Attacks - What You Need to Know

Backed reportedly by crime syndicates in China, a new romance scam known as “pig butchering” is on the rise, trapping people with long-term health problems, who are older, widowed, and who feel isolated. The goal is to spend long periods “fattening” them with fake love and investment offers, then drain them of their money, the…

Read More

Guarding against Website/browser hoaxes over the holidays

As the holiday season draws closer, we must continue looking for the typical signs of being hacked. Here are more holiday reminders and how to protect your website browser. Mousetrapping Malicious online marketers entice users to visit malicious websites. Once at the bogus site, hackers can disable your “back button.” You notice your screen fills…

Read More

Staying safe over the holidays

The holiday season is a time of rest, family and celebration. Be on the lookout for the typical signs of being hacked. Here are my holiday reminders. Phishing  It is called social media phishing when a hacker emails you impersonating a reputable social media site. Hackers insist you have an urgent “account issue” waiting for…

Read More

Romance scams in 2023 expected to explode

In 2021, 323 million people used dating apps or dating sites to meet new people. But, over 8,000 competitive online dating sites and platforms worldwide also attract romance scammers. And with more love-seekers expected to use dating sites over the holidays, 2023 could be an explosive and profitable year for scammers.  In Canada, according to…

Read More

Monitoring your children’s online activity

We at Cyology Labs have always said that structured surveillance of your children or teenagers and limiting online time is the key to protecting our children. Yet there are always those who believe tracking, monitoring and checking out their activities is just as feasible. In other words, parents who instinctively protect their kids are being…

Read More

Sharing special memories and staying cyber secure

Reaching a goal or accomplishment you’re proud of and celebrating it with your loved ones is one of life’s greatest joys. These unique occasions deserve bragging rights, whether you got married, celebrated a birthday, or taught your dog how to give a high-five.  Unfortunately, the internet isn’t always secure when sharing precious moments online. It…

Read More

Staying in touch while remaining cyber secure

Getting in touch with friends and family would be much more difficult without the internet and social media platforms. After all, we were able to enjoy several significant moments while online, protected behind our screens. How do we stay in touch while remaining cyber secure? Online connections have made it possible for us to remain in…

Read More

Hackers are targeting more victims than ever before

Scammers continue to employ unscrupulous practices to strip you of your money. A 76-year-old retired grandfather in Australia surrendered $26,000 last week after paying an invoice through email to his bank—or what he thought to be his bank. But hackers hijacked the email and then replied using fake bank information. Considering nothing out of the…

Read More

4 Cyberthreats small businesses need to know

Data breaches have become more common in recent years, owing to the rapid emergence of new threats. The average cost of a data breach increased 2.6% from 2021 to 2022.* Hackers can now access sensitive information a lot easier thanks to the growth of the internet and the increasing interconnectedness of businesses. They can then…

Read More

How to know if your phone is hacked?

Maybe you’ve noticed it, or you haven’t, but phone hacking is rising. It’s not too surprising. The pandemic turned the office worker into a mobile worker, primarily working from the comforts of home, a fast and almost overnight move. The urgency to adapt left many companies unprepared and, in many cases, without proper cybersecurity protection—the perfect…

Read More

LastPass gets passed

Our team is letting you know that in August one of the world’s most prominent password managers, LastPass, confirmed that it had been hacked. According to the company, unknown hackers stole “portions of source code and some proprietary LastPass technical information” but not its unstored master passwords or customer data. The breach came from a…

Read More

Cyber Security Today, Week in Review for Friday August 19, 2022

The following transcript of my conversation with Terry Cutler has been edited for clarity. To hear the whole discussion play the podcast.) Howard: Let’s start with the decision by the Zero Day Initiative to pressure companies to issue better security updates. For those who don’t know, the ZDI is a program run by security company…

Read More

Agility for your people, processes and technology

Nothing is more crucial to a business than agility. You’ve heard me say this before. Yes, profit matters, but companies can achieve consistent profits easily when markets are stable. The world, of course, doesn’t always work this way. Markets are unpredictable, and things change in the blink of an eye. If your business’s viability depends…

Read More

Ontario women scammed out of $60,000

When an Ontario senior received a call alerting her that someone was using her name and banking information for illicit purposes thus began a series of money transfers amounting to a loss of $60,000—her life savings. Katharina Muir of Etobicoke told CTV News that the caller, claiming to be from her bank, warned that a…

Read More

Cyber Security Today, Week in Review, June 10, 2022

Terry Cutler, head of Montreal’s Cyology Labs, joins Cyber Security Today to discuss some of what’s been happening recently. The following transcript has been edited for clarity. To hear the full conversation play the podcast Howard: Let’s start by looking at the LockBit ransomware gang’s claim on Monday that it has stolen data from security provider Mandiant…

Read More

Terry Cutler on CBC talks about Fraudster App

I spoke about my new app called Fraudster this week with Sabrina Marandola on CBC’s Let’s Go Fraudster delivers important fraud alerts via push notifications and timely events. In addition, the app delivers distinctive insight and incisive analysis of BOTH online and offline threats targeting businesses and individual consumers.  As an innovative free app that…

Read More

Account pre-hijacking

Researchers have discovered that hackers can access users’ online accounts using account pre-hijacking. Put another way, a hacker can perform a set of actions before an unsuspecting victim even creates an account. The Microsoft Security Response Center reported that these attacks have the same effect as account hijacking. They can allow the attacker to access…

Read More

Cyber Security Today, Week in Review for Friday, May 13, 2022

Howard: From Montreal, I’m joined by Terry Cutler. Good afternoon. Let’s start with Anti-Ransomware Day. This began in 2020 as an education initiative by Kaspersky and the Interpol police co-operative. It was sparked by the global spread three years earlier of the WannaCry strain of ransomware. A lot has changed in ransomware since then: Gangs…

Read More

Law enforcement scams

The latest law enforcement scams are bogus legal requests for customers’ data from companies. Moreover, it’s happening to reputable technology companies. Initially, the fraudster compromises a law enforcement agency’s email system. After which, the fraudster will fabricate a legal-looking “emergency data request.” The data request includes a request for user names, IP addresses, email addresses…

Read More

Your employees are your biggest threat

Cybercriminals who want to exploit a business’ network vulnerabilities are always searching for access. The only way to counter these hackers is by deploying a strong cybersecurity posture. Additionally, companies should build a comprehensive security solution. Nevertheless, you may overlook the weakest link in your battle against cyber threats—your employees.  Businesses today must enhance their…

Read More

World Password Day

If you didn’t know, today is World Password Day, an annual event created by Intel Security in 2013 to raise awareness about the importance of strong passwords.  Ironically, it coincides with continued reports that lazy passwords still put companies and individuals at risk for cybercrime. Default passwords, especially common passwords, pose significant risks.  In an investigation…

Read More

Cryptocurrency scams Part 2

Let’s look at four common cryptocurrency scams. The cryptocurrency market is susceptible to common scams. Because many rules are unclear and challenging for regulators to enforce, Cryptocurrencies are prime targets for scammers. AirDrop The AirDrop scam is prominent in the decentralized finance field or DeFi.  Tokens are dropped in your digital wallet via AirDrop. In…

Read More

Job offer scams

With job offer scams, a general rule is that you’re probably right if you think the job offer isn’t genuine.   Canada’s Better Business Bureau reported that in 2019, 14 million victims paid out $2 billion in direct losses to fake recruiters. Further, the problem doubled in 2020 during the peak of COVID-19. Youth between the…

Read More

Cryptocurrency scams

The growing popularity of cryptocurrency has seen an increase in cryptocurrency scams.  A cryptocurrency is a digital currency that exists virtually and uses cryptography to secure transactions. It doesn’t rely on the Go-Betweens, such as brokerages, exchanges, banks, or governments. In fact, a peer-to-peer network, known as a blockchain, monitors and organizes the wallet. Cryptocurrency…

Read More

Hacking the Bluetooth

The Bluetooth handshake occurs when two devices pair up to establish a connection, such as your phone and car. Hackers in the area use specialized software and hardware to discover vulnerable Bluetooth-equipped devices. The primary use of Bluetooth involves connecting multiple devices without using cables or wires. Further, Bluetooth relies on short-range radio frequency, and…

Read More

LockBit 2.0 

LockBit 2.0, unlike other Ransomware, spreads on its own. It confuses defence systems and hooks up with other Ransomware on other networks, for instance. It functions in this manner: The attacker infects a single host and sets it loose. As a result, it is embedded in a network and spreads its encrypting code across devices.…

Read More