Internet Safety
AI Scams Targeting Children: A Terrifying Reality
A chilling revelation has come to light: criminals are harnessing the power of AI scams to hack into children’s social media accounts to clone their voices. These online scams have frightening implications. There is an urgent need for heightened awareness and security measures. Security experts have warned about even the most basic scammers employing readily…
Read MoreUnwind Securely: Safeguard Your Digital Footprint on Vacation
Contacting friends and family would be much more difficult without the internet and social media platforms. After all, we can enjoy several significant moments online, protected behind our screens. Online connections have enabled us to remain in touch, never missing a minute, whether attending your friend’s virtual wedding or watching your favourite cousin’s newborn take…
Read MoreHoliday Hacks: Protecting Your Browser Amidst Festive Cyber Fervour
As the holiday season approaches, digital transactions transform into a bustling marketplace blending festive cheer with lurking cyber threats. Amidst the joyous celebrations, it’s paramount to fortify our digital defences beyond the conventional cues of cyber intrusion. Here, we delve deeper into safeguarding your website browser, unveiling lesser-known threats often lurking beneath the surface. As…
Read MoreThe Elusive Tactics of Star Blizzard
A shadowy group of hackers has emerged onto the global stage, orchestrating a sophisticated global spear phishing attack reportedly linked to the Kremlin. Known under an array of pseudonyms—Star Blizzard (formerly SEABORGIUM), Callisto Group, TA446, COLDRIVER, TAG-53, and BlueCharlie—this clandestine unit employs a cunning strategy. Their method? Covertly embedding seemingly harmless links within legitimate websites…
Read MoreUnveiling the Digital Grinch: Fake Affiliate Scams, Giveaways, and Followers
As the holiday spirit blankets social media, lurking beneath are cyber villains wielding deceptive tactics. Discover the dark underbelly of the festive season: affiliate scams infiltrating platforms with stolen credentials, baited fake giveaways masquerading as gifts, and the rise of counterfeit followers. These schemes, designed by digital impostors, prey on our trust and eagerness. Unwary…
Read MoreBeware of Rental Scams: Protect Yourself from Fraudulent Listings
As the demand for rental properties increases, so does the risk of falling victim to rental scams. Exercise caution when searching for rental accommodation, as scammers have become increasingly sophisticated in their tactics. By altering legitimate ads or creating fake ones, these scammers aim to deceive unsuspecting individuals into providing personal information, security deposits, and…
Read MoreYour password is MeowsterDefender: Study suggests not using your pets as passwords.
According to a study by Telstra and YouGov, 46 percent of Australians use passwords containing either their favourite sports team, birthday or the name of their beloved pet. In addition to the recent concerns raised in Australia over password security, it is worth noting that Canadians also face similar challenges when it comes to online…
Read MoreEthical Hackers: Champions of Cybersecurity in a Threatening Digital Landscape
The demand for ethical hackers has skyrocketed in an era where the internet dominates our lives and cybercrime is rising. As the guardians of our digital realm, these skilled individuals play a pivotal role in the ever-evolving cybersecurity landscape. With the surge in cybercrime incidents, including data breaches, financial fraud, and identity theft, the need…
Read MoreUnmasking the even Darker Side of Romance: AI Hackers in the World of Love
In online romance, finding love has become a precarious dance with the unknown. As technology evolves, so do the tactics of scammers and fraudsters. In recent years, a new sinister force has emerged: AI hackers infiltrating the world of romance scams. These sophisticated virtual predators employ artificial intelligence (AI) to deceive unsuspecting victims, leaving shattered…
Read MoreHow AI Empowers Everyday Consumers by Safeguarding Against Hackers
Artificial Intelligence (AI) is stepping in as a powerful ally to protect everyday consumers from the clutches of hackers. This blog post will explore how AI plays a pivotal role in safeguarding individuals, ensuring their digital privacy, and enhancing their online security. Robust Threat Detection: Enhanced Email and Web Security: Personalized Behavioral Analysis: Intelligent Password…
Read MoreSwiftly Outsmart Ticket Scammers: Protecting Yourself During The Eras Tour
…or any high-profile tour or event. As the highly anticipated Taylor Swift Canadian concert tour approaches, fans are hunting for tickets. But amidst the excitement, staying vigilant and protecting yourself from ticket scams is crucial. Let’s learn from a cautionary tale and gain valuable advice to ensure a scam-free ticket-buying experience. Picture this: A fan,…
Read MoreThe phone scam of nightmares: AI simulations that will make your skin crawl
The advent of artificial intelligence (AI) has led to a new era of phone scams that are not only advanced but also highly sophisticated. Scammers can deploy realistic simulations to lure unsuspecting victims into divulging sensitive information or transferring money. In this article, we will delve into the inner workings of these scams and explore…
Read MoreThe Fine Print: What You Need to Know Before Signing Up for a Free Trial
The lure of a free trial can leave you bound by unexpected charges and subscriptions. Social media ads promoting weight-loss pills, anti-wrinkle serums, or muscle-enhancing supplements often use high-pressure sales tactics, countdown timers, and celebrity endorsements to entice you to sign up for a trial offer. However, by accepting these offers, you could be charged…
Read MoreScamming the Scammers: Creative Ways to Turn the Tables on Won Scams
Imagine you receive a message claiming you’ve won a prize, whether it’s a vacation, cruise, lottery, or sweepstakes. The person contacting you seems ecstatic about your winnings and can’t wait for you to claim them. However, be wary of scams like these that are designed to trick you into giving away your personal information or…
Read MoreDon’t Let Tax Season Turn into Identity Theft Season
As we embrace the convenience of online tax filing, we must prioritize the security of our personal and financial information. With cybercriminals and hackers constantly on the prowl for sensitive data, the risks of falling prey to online fraud are higher than ever, particularly during the tax season. Considering this, we must be mindful of…
Read MoreThe Truth About Online Reviews: How to Protect Yourself from Fraudulent Feedback
In today’s e-commerce platforms, we come across incentivized, sponsored, or fraudulent reviews, creating a confusing experience for online shoppers. This problem becomes more complicated when we consider the impact of the volume and sentiment of consumer reviews. Online customer reviews are powerful tools for businesses, allowing them to build trust with potential customers and improve…
Read MoreThe Amazon Prime Scam You Need to Know About: Stay Safe Online
Amazon Prime, the popular subscription service that offers fast shipping and streaming of music and movies, is being targeted by cybercriminals in a new phone scam. There has been a rise in Prime members receiving phone calls from con artists pretending to be Amazon. The first step in the scam is to determine if the…
Read MoreCyber Attack Alert: How to Stay Safe on Gmail with Chrome
If you have a Gmail account and use Chrome on your PC, beware of a dangerous new attack. The attack involves a fake Chrome browser extension called AF that infects computers and steals data from Gmail inboxes. This blog will tell you about the new cyber attack alert: how to stay safe on Gmail with Chrome.…
Read MoreAvoid Paycheck Scams Like a Boss
Paycheck scams are a type of fraud in which scammers target individuals or businesses by offering fake job opportunities and promising high salaries and flexible schedules. These scammers often use phoney job postings on job boards and social media platforms or send unsolicited job offers via email or text. Once the victim accepts the job…
Read MoreGoodbye TikTok? Canadian Government Takes Aim at Popular App
TikTok is a Chinese-based and owned social media app that has gained immense popularity among young people worldwide, particularly during the COVID-19 pandemic. The app allows users to create short videos and share them with others, but there are growing concerns about the cybersecurity risks associated with using TikTok. Earlier this week, the Canadian government…
Read MoreEight Ways Red Flags Can Keep You Safe Online
Internet safety is always on our minds, and for a good reason. It is an excellent resource for learning, connecting with friends and family, and finding information. It can also be a dangerous place. That’s why it’s essential to be aware of the red flags that warn someone may be in danger online. Some of…
Read MoreHow older adults can use social media safely
Social media enables us to share information, interests, and ideas with friends and families. Navigating social media is not always easy, but older adults shouldn’t refrain from using it. If you protect yourself and your accounts from common cyber threats, you are ready to enjoy all the positives social media can offer! Protect yourself with…
Read MorePayment app scams are on the rise again
In 2021 and the first half of 2022, banks in the US reported 192,000 cases, or one in ten, of crimes perpetrated on customers using the payment app Zelle. Less than 3,500 clients got refunds out of all those cases. Venmo, Cash App, and other apps like Zelle make it simple to transfer funds to…
Read MoreRomance Scam that Goes for the Whole Hog
Backed reportedly by crime syndicates in China, a new romance scam known as “pig butchering” is on the rise, trapping people with long-term health problems, who are older, widowed, and who feel isolated. The goal is to spend long periods “fattening” them with fake love and investment offers, then drain them of their money, the…
Read MoreGuarding against Website/browser hoaxes over the holidays
As the holiday season draws closer, we must continue looking for the typical signs of being hacked. Here are more holiday reminders and how to protect your website browser. Mousetrapping Malicious online marketers entice users to visit malicious websites. Once at the bogus site, hackers can disable your “back button.” You notice your screen fills…
Read MoreStaying safe over the holidays
The holiday season is a time of rest, family and celebration. Be on the lookout for the typical signs of being hacked. Here are my holiday reminders. Phishing It is called social media phishing when a hacker emails you impersonating a reputable social media site. Hackers insist you have an urgent “account issue” waiting for…
Read MoreRomance scams in 2023 expected to explode
In 2021, 323 million people used dating apps or dating sites to meet new people. But, over 8,000 competitive online dating sites and platforms worldwide also attract romance scammers. And with more love-seekers expected to use dating sites over the holidays, 2023 could be an explosive and profitable year for scammers. In Canada, according to…
Read MoreMonitoring your children’s online activity
We at Cyology Labs have always said that structured surveillance of your children or teenagers and limiting online time is the key to protecting our children. Yet there are always those who believe tracking, monitoring and checking out their activities is just as feasible. In other words, parents who instinctively protect their kids are being…
Read MoreSharing special memories and staying cyber secure
Reaching a goal or accomplishment you’re proud of and celebrating it with your loved ones is one of life’s greatest joys. These unique occasions deserve bragging rights, whether you got married, celebrated a birthday, or taught your dog how to give a high-five. Unfortunately, the internet isn’t always secure when sharing precious moments online. It…
Read MoreStaying in touch while remaining cyber secure
Getting in touch with friends and family would be much more difficult without the internet and social media platforms. After all, we were able to enjoy several significant moments while online, protected behind our screens. How do we stay in touch while remaining cyber secure? Online connections have made it possible for us to remain in…
Read MoreHackers are targeting more victims than ever before
Scammers continue to employ unscrupulous practices to strip you of your money. A 76-year-old retired grandfather in Australia surrendered $26,000 last week after paying an invoice through email to his bank—or what he thought to be his bank. But hackers hijacked the email and then replied using fake bank information. Considering nothing out of the…
Read More4 Cyberthreats small businesses need to know
Data breaches have become more common in recent years, owing to the rapid emergence of new threats. The average cost of a data breach increased 2.6% from 2021 to 2022.* Hackers can now access sensitive information a lot easier thanks to the growth of the internet and the increasing interconnectedness of businesses. They can then…
Read MoreHow to know if your phone is hacked?
Maybe you’ve noticed it, or you haven’t, but phone hacking is rising. It’s not too surprising. The pandemic turned the office worker into a mobile worker, primarily working from the comforts of home, a fast and almost overnight move. The urgency to adapt left many companies unprepared and, in many cases, without proper cybersecurity protection—the perfect…
Read MoreCyber Security Today, Week in Review for Friday, September. 2, 2022
You can listen to the full podcast here Howard: A university student was victimized by a sophisticated fake job offer scam. The hacker noticed that this person had a profile with an IT background on the AngelList social media site, found the victim’s email address and sent them a fake job offer from the well-known…
Read MoreLastPass gets passed
Our team is letting you know that in August one of the world’s most prominent password managers, LastPass, confirmed that it had been hacked. According to the company, unknown hackers stole “portions of source code and some proprietary LastPass technical information” but not its unstored master passwords or customer data. The breach came from a…
Read MoreCyber Security Today, Week in Review for Friday August 19, 2022
The following transcript of my conversation with Terry Cutler has been edited for clarity. To hear the whole discussion play the podcast.) Howard: Let’s start with the decision by the Zero Day Initiative to pressure companies to issue better security updates. For those who don’t know, the ZDI is a program run by security company…
Read MoreAgility for your people, processes and technology
Nothing is more crucial to a business than agility. You’ve heard me say this before. Yes, profit matters, but companies can achieve consistent profits easily when markets are stable. The world, of course, doesn’t always work this way. Markets are unpredictable, and things change in the blink of an eye. If your business’s viability depends…
Read MoreOntario women scammed out of $60,000
When an Ontario senior received a call alerting her that someone was using her name and banking information for illicit purposes thus began a series of money transfers amounting to a loss of $60,000—her life savings. Katharina Muir of Etobicoke told CTV News that the caller, claiming to be from her bank, warned that a…
Read MoreCyber Security Today, Week in Review, June 10, 2022
Terry Cutler, head of Montreal’s Cyology Labs, joins Cyber Security Today to discuss some of what’s been happening recently. The following transcript has been edited for clarity. To hear the full conversation play the podcast Howard: Let’s start by looking at the LockBit ransomware gang’s claim on Monday that it has stolen data from security provider Mandiant…
Read MoreTerry Cutler on CBC talks about Fraudster App
I spoke about my new app called Fraudster this week with Sabrina Marandola on CBC’s Let’s Go Fraudster delivers important fraud alerts via push notifications and timely events. In addition, the app delivers distinctive insight and incisive analysis of BOTH online and offline threats targeting businesses and individual consumers. As an innovative free app that…
Read MoreAccount pre-hijacking
Researchers have discovered that hackers can access users’ online accounts using account pre-hijacking. Put another way, a hacker can perform a set of actions before an unsuspecting victim even creates an account. The Microsoft Security Response Center reported that these attacks have the same effect as account hijacking. They can allow the attacker to access…
Read MoreCyber Security Today, Week in Review for Friday, May 13, 2022
Howard: From Montreal, I’m joined by Terry Cutler. Good afternoon. Let’s start with Anti-Ransomware Day. This began in 2020 as an education initiative by Kaspersky and the Interpol police co-operative. It was sparked by the global spread three years earlier of the WannaCry strain of ransomware. A lot has changed in ransomware since then: Gangs…
Read MoreLaw enforcement scams
The latest law enforcement scams are bogus legal requests for customers’ data from companies. Moreover, it’s happening to reputable technology companies. Initially, the fraudster compromises a law enforcement agency’s email system. After which, the fraudster will fabricate a legal-looking “emergency data request.” The data request includes a request for user names, IP addresses, email addresses…
Read MoreYour employees are your biggest threat
Cybercriminals who want to exploit a business’ network vulnerabilities are always searching for access. The only way to counter these hackers is by deploying a strong cybersecurity posture. Additionally, companies should build a comprehensive security solution. Nevertheless, you may overlook the weakest link in your battle against cyber threats—your employees. Businesses today must enhance their…
Read MoreWorld Password Day
If you didn’t know, today is World Password Day, an annual event created by Intel Security in 2013 to raise awareness about the importance of strong passwords. Ironically, it coincides with continued reports that lazy passwords still put companies and individuals at risk for cybercrime. Default passwords, especially common passwords, pose significant risks. In an investigation…
Read MoreCryptocurrency scams Part 2
Let’s look at four common cryptocurrency scams. The cryptocurrency market is susceptible to common scams. Because many rules are unclear and challenging for regulators to enforce, Cryptocurrencies are prime targets for scammers. AirDrop The AirDrop scam is prominent in the decentralized finance field or DeFi. Tokens are dropped in your digital wallet via AirDrop. In…
Read MoreJob offer scams
With job offer scams, a general rule is that you’re probably right if you think the job offer isn’t genuine. Canada’s Better Business Bureau reported that in 2019, 14 million victims paid out $2 billion in direct losses to fake recruiters. Further, the problem doubled in 2020 during the peak of COVID-19. Youth between the…
Read MoreCryptocurrency scams
The growing popularity of cryptocurrency has seen an increase in cryptocurrency scams. A cryptocurrency is a digital currency that exists virtually and uses cryptography to secure transactions. It doesn’t rely on the Go-Betweens, such as brokerages, exchanges, banks, or governments. In fact, a peer-to-peer network, known as a blockchain, monitors and organizes the wallet. Cryptocurrency…
Read MoreHacking the Bluetooth
The Bluetooth handshake occurs when two devices pair up to establish a connection, such as your phone and car. Hackers in the area use specialized software and hardware to discover vulnerable Bluetooth-equipped devices. The primary use of Bluetooth involves connecting multiple devices without using cables or wires. Further, Bluetooth relies on short-range radio frequency, and…
Read MoreLockBit 2.0
LockBit 2.0, unlike other Ransomware, spreads on its own. It confuses defence systems and hooks up with other Ransomware on other networks, for instance. It functions in this manner: The attacker infects a single host and sets it loose. As a result, it is embedded in a network and spreads its encrypting code across devices.…
Read More