-
Elizabeth V Calise commented on the post, Online Fraud is not a bad thing…, on the site 6 years, 11 months ago
Interesting article Fred. I am not really sure how I feel about Nick Wells’ statement. When he said, “It’s the cost of doing business.”, I completely agree with it. There are always risks making purchases online and one need to be proactive in paying close attention to what links you are clicking on and if the websites are legitimate. I don’t…[Read more]
-
Elizabeth V Calise wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
This is a short article, but I decided to post this one because this was a past thought I had as the US was approaching Thanksgiving, Black Friday and Cyber week/ Cyber Monday. It may still be a too early for […]
-
Elizabeth V Calise wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
Snowbug is a group that has been active since 2015 and seems to be highly interested in foreign policy information from diplomatic and government entities. The group’s victims include organizations in Brazil, P […]
-
Elizabeth V Calise commented on the post, Sex toy company admits to recording users' remote sex sessions, calls it a 'minor bug', on the site 6 years, 11 months ago
Very concise, yet a bit of a disturbing article. Like the article stated, it was scary when one’s refrigerator was hacked, but for a very personal part of your life to be hacked hits a whole new level. The hacking stories seem to get worse and worse. When it comes to identify theft or credit cards being stolen, there is always that feeling of…[Read more]
-
Elizabeth V Calise commented on the post, Do you need a VPN?, on the site 6 years, 12 months ago
Andres,
This is a really informative article especially for the ones who are not so technical. Ever since the Internet privacy rules have been pulled, I have been sharing with my non-technical friends about installing VPN for security purposes. I have already passed this article on to a few of them. With all the cyberattacks and Internet…[Read more]
-
Elizabeth V Calise wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 12 months ago
I found this article interesting since it relates to a prior discussion the class had about an organization’s data when having an international site in China. Even though China is the world’s second largest eco […]
-
Hi Elizabeth:
Very interesting article and I was very surprise that China implement another laws to restrict the internet users.
-
Elizabeth,
In my opinion this law has many advantages and disadvantages, It will give the government a control of people activities over the internet which can target any people who are trying to do something wrong. At the mean time there is a big disadvantage since this law will touch the privacy of citizens who are now afraid to speak up freely about their ideas and thoughts.
Very interesting article and a big debate can be open regarding this topic. -
what is freedom of speech? what is freedom of bear? Do you think someone doesnt need to be responsible for their words? There is no free launch. We all do know about it. If you were leader of China, what would you do in fact of 1 billion+ of population? There is no wrong or right (decision or law). Dont they want it’s the best for their citizen to get the best out of internet? We all make touch choices.
-
Hey Elizabeth,
This was a great article indeed. China has always surprised the world with its constant innovation and developments, being a closed economy. It put a ban on Google, Facebook, Yahoo, etc. to protect its internal systems. All these companies failed to make a mark and in fact, local companies in China, example, Baidu, rose up to show strength. I think all countries should have a balanced regulation in cyber threat and I would in many ways not encourage the approach that China has taken. Banning the most important networks also shows lack of development in many ways.
-
-
Elizabeth V Calise wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
A new form of cybercrime has been hitting American citizens. Recently, mobile phone account numbers are being stolen and then transferring services to a different device. Additionally, hackers have being using […]
-
Elizabeth V Calise commented on the post, U.S. Asks China Not to Enforce Cyber Security Law, on the site 7 years ago
Jonathan,
Thanks for posting this! I always enjoy the international articles regarding cyber and the possible impact one country may cause on other countries. You mentioned that companies may be forces to rework their infrastructure and security in order to comply. I was also thinking would companies consider leaving China if the China decided…[Read more]
-
Elizabeth V Calise commented on the post, Major Wi-Fi security flaw could allow hackers to listen in on any of your devices, on the site 7 years ago
Hi Donald,
Interesting article you posted. However, this news does not surprise and this has been mentioned multiple times before. At this point, I think most technology is not 100% safe from hackers. The best that can be done is implementing security to defend the hacks. Additionally, for any technology currently out there or being developed,…[Read more]
-
Elizabeth V Calise wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
This is a short article, but I found it pretty interesting. I haven’t read many articles involving cyber attacks in Canada. This article sums up why, which I find interesting that many attacks have not been leaked […]
-
Elizabeth V Calise commented on the post, Don't overlook physical controls, on the site 7 years ago
Fred,
Really good posting. I feel like I haven’t read a security article in a while regarding physical controls. It is definitely overlooked and tends to be forgot about. Like Amanda said, this is not surprising, but I did feel this article demonstrated a extreme case of weak physical controls. Aside from employees stealing company property or…[Read more]
-
Elizabeth V Calise wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
Almost 60% of small businesses have been victims of a cyberattack in the past year; however, most them were not aware they were attacked. Nationwide conducted its third annual survey which included over 1,000 […]
-
Really interesting article. I think this is a real problem and we are going to be seeing it more and more moving forward. I think it comes form they simply do now have the money to properly keep up with cost of cyber security.
-
Elizabeth – Your response to Cyber-attacks on SMEs is quite interesting to read. I have to agree that SMEs definitely face a lot of challenges because of lack of resources, poor understanding of cyber security threats, and lack of capital to invest in such measures. One interesting aspect that I found in your response is the fact that the recovery is slow and expensive. This is an important point that you made because if recovery is costly, then it puts SMEs again into problems because they cannot afford enough to implement anti-malware solutions quickly. This not only affects their capital expenditure, but also the operations on the whole.
-
Elizabeth,
Sharing this type of articles is very important to educate people and small companies to think more about creating their own IT security departments that would be in charge of educating employees and protecting their IT infrastructures. I believe these types of articles give a strong sign to these small companies to think seriously about security by hiring more IT people and define a good budget to run these security departments. These companies don’t really work hard enough to secure there IT departments, especially if they are small. -
For an extreme example, an usual startup company, what is priority for them? Growing up their business, they must put resource on their priority. Data presented above only make statistical sense. There are countless small business. What makes them think they will be attacked? For bad guys, how come do they find out those nameless company? Do you think someone outside of company or someone inside of company has higher possibility find out the weakness of company?
-
-
Elizabeth V Calise wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
There is more to technology than end-user experience. Aside from user experience, there are other considerations like maintenance, operations and 24/7 support. Even though some of these considerations are less […]
-
Elizabeth V Calise commented on the post, US pressured North Korea by overwhelming hackers with data traffic, on the site 7 years, 1 month ago
Johnathan,
I agree with Amanda, this is a really interesting article. Good find! Cyber wars are always something to think about and to have concerns with. It is an interesting technique that the US took, but it is a stepping stone for cyber war. In this case, US actions did not cause rebellious actions back. However, next time there could be a…[Read more]
-
Elizabeth V Calise commented on the post, Post a boarding pass on Facebook, get your account stolen, on the site 7 years, 1 month ago
Hi Andres,
I know I am a bit late responding to your post, but this was a great read! I travel very often ( at least once a month) for either business or personal travel. I am always aware of never plugging my usb in the airports and the rental cars, but I never put any thought into my tickets and how they can be used by a hacker. I am never…[Read more]
-
Elizabeth V Calise wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 1 month ago
I was not able to find any new cyber attack article that was not already posted in the prior weeks and for this week. So I did not want to be repetitive and post the same thing again. However, I found this article […]
-
Elizabeth,
I do have a hard time too to find good cyber topics that were not covered in the past by other students. However, your topic is very interesting, not only for new Cyber Security students, for all Cyber Security students. There is high demand for people in this field which encourage us to work hard since there is potential grow in this career.
I do believe that this demand increased and will be big after Equifax attacks that no one expected in the past. Many companies are working on creating new IT security departments to protect their IT resources.
This field is new to me, My undergrad studies were in engineering and I am very excited to switch my career and be able to use my technical background to develop new IT security architecture as well as securing excising once.
-
-
Elizabeth V Calise wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 1 month ago
I know this article is not about recent cyber-attacks, but I did find it quite intriguing. In general, I am not a super fan of any celebrity, so my search history does not usually include any known actors, […]
-
Elizabeth V Calise wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 1 month ago
I found this article quite interesting since I recently entered the environmental sector for work.
A hacker group known as “Dragonfly” is behind recent cyber attacks on the energy industry in Europe and Nor […]
-
Elizabeth V Calise commented on the post, Week 3 Question, on the site 7 years, 8 months ago
Mengxue,
Like Amanda mentioned you brought up a good point about companies implementing laws/regulations for examiners even though this does not mean examiners will always follow protocol. The same concern can follow even when examiners are required to participate in ethics training. This type of concern can relate to many other professions.…[Read more]
-
Elizabeth V Calise commented on the post, Week 3 Question, on the site 7 years, 8 months ago
Ruslan,
I really liked your last point in your response. After reading everyone’s’ responses and taking in their perspectives, I believe that is what ethics comes down to in digital forensics. It is not only that the professionals need to be trained/educated/certified, but they need to have a naturally good character. A professional can be…[Read more]
- Load More
I found a few articles on this when I was looking for an article this week. A lot of the tips given are the same ones people should always use when online such as making sure the URL is spelled correctly and don’t click links from emails without verifying the sender. Hackers are becoming increasingly sophisticated though, making their websites and emails look more and more perfect. I don’t blame people for being wary of online shopping.
Elizabeth,
Very interesting article. I am surprised this high percentage of Americans don’t trust online shopping. I do believe the something, we share our sensitive information all time with different individuals and that can put us under the risk to be victims. These parties sell us items are individuals and they can be scams having the goal of attacking us.
Thank you for the article.