Blog-35: Cybers Guards: Understanding Cybersecurity on Smartphones (UCSph) - (Article 3) Are you curious about niche smartphone OS options beyond Windows, Android, and iOS? This article explores seven alternative operating systems: Symbian, Tizen OS, Sailfish OS, Ubuntu Touch, KaiOS, Sirin OS, and Harmony OS. These players add spice to the mobile OS mix with unique offerings and approaches to security....Read PDF
2024
Blog-34: IT World Canada: Understanding Cybersecurity on Smartphones (UCSph) - Windows Phone Operating System (Article 2) The Windows Phone was first known as Windows Mobile in its early days, until Microsoft recognized the need to adapt and innovate in response to the competitive landscape of the smartphone market. After the changes introduced by Apple (iOS) and Google (Android) in 2007, Microsoft decided to take a new direction and created Windows Phone as a response...Read PDF
2024
Blog-33: IT World Canada: Understanding Cybersecurity on Smartphones (UCSph) - iOS Operating System (Article 1) The smartphone is one of the most remarkable inventions in contemporary human history and is currently the most widely utilized electronic device globally. Its evolution has transformed modern communication technology, allowing us to communicate efficiently and instantly across vast distances worldwide...Read PDF
Blog-31: IT World Canada: Understanding Cybersecurity Management in DeFi (UCM-DeFi) – Blockchain Security (Article 4) In today’s digital landscape, blockchain technology has emerged as a powerful force, revolutionizing sectors like healthcare, finance, government, and commerce with its unparalleled security features. However, as with any technological advancement, it has not been immune to the cunning tactics of cybercriminals...Read PDF
2023
Blog-30: IT World Canada: Understanding Cybersecurity Management in DeFi (UCM-DeFi) – DeFi Platforms (Article 3) With the help of blockchain and smart contracts, DeFi platforms are shaking up the financial industry by offering a wide range of services without the need for intermediaries like banks or brokerages. From lending and borrowing to trading and even gaming, DeFi is changing the way we access financial services...Read PDF
Blog-14: IT World Canada:Understanding Android Malware Families (UAMF) – Adware and Backdoor (Article 5) Mobile adware refers to the advertising material hidden inside legitimate apps infected by malware. Most of these apps are available from third-party sources. Adware continuously shows unwanted advertisements on mobile screens even if the user attempts to force-close the app...Read PDF
2021
Blog-13: IT World Canada:Understanding Android Malware Families (UAMF) – Riskware – is it worth it? (Article 4) Riskware is defined as a legitimate program that presents potential risks to the security vulnerabilities on a device. Although it is a legitimate program, bad actors use Riskware to steal information from the device and redirect users to malicious websites or perform functions at the expense of device security...Read PDF
2021
Blog-12: IT World Canada:Understanding Canadian Cybersecurity Laws: refactored — our series in summary (Article 10) In this tenth and final article in our Understanding Canadian Cybersecurity Laws series, we will look back through the previous nine articles and revisit the topics covered in each of them. Our journey begins with the first article, The Foundations, first published by IT World Canada on January 13, 2020... Read PDF
2021
Blog-11: IT World Canada:Understanding Android Malware Families (UAMF) – Ransomware and scareware (Article 3) Ransomware is malicious software used by individuals to encrypt documents on computers or digital devices. Perpetrators demand a ransom from the owner of a device to access the victim’s documents; once in, criminals install ransomware on their mobile phone or computer... Read PDF