HomePrivacy

Privacy

Cybersecurity expert on Waterloo doxxing case: More legal action likely

A recent doxxing case that resulted in Waterloo-based TextNow Inc. being ordered to name two of its subscribers accused of terrorizing employees of game...

RCMP: Spyware only used with court approval

At a parliamentary committee hearing the force admits spyware has been used since before 2012

Cyber Security Today, Week in Review for Friday, August 5, 2022

This episode features an interview with privacy expert Ann Cavoukian.

U.S., Canada urged to toughen fight against commercial spyware

US intelligence agency employees should be banned from joining foreign spyware firms, Citzen Lab researcher tells Congress

Cyber Security Today, July 20, 2022 – An anonymous service that can get you hacked, infected online restaurant platforms, a Mac backdoor discovered, and...

This episode reports on the abuse of residential IP proxy services, the discovery of data skimmers on online restaurant platforms, a  new Mac backdoor discovered and more

NIST names first four quantum-resistant encryption tools

Algorithms will eventually be included in applications to prevent encryption from being cracked by quantum computers

RBC announces partnerships to provide clients with increased security and control over their financial data

RBC has announced partnership agreements with both Plaid and Envestnet | Yodlee as it looks to provide clients with better access, and control, and...

Government’s latest attempt at privacy legislation reform includes AI regulation

The Liberal government has introduced its second attempt at overhauling the country's privacy laws covering the business sector. Innovation Minister François-Philippe Champagne introduced Bill C-27...

Popular Posts

Privacy Videos

Privacy Downloads

Privacy Blogs

Slideshows

Experts sound the alarm on readiness for Canada’s new privacy regulations

Businesses that haven’t started preparing for the new privacy rules coming to Canada this fall could be in for an unpleasant surprise, say experts. The...

Insider threats: Establishing intent and people-centricity

The “Bring Your Own Device” movement (BYOD) is now a given in the workplace. People have come to expect free access to company computing...