Understanding Cybersecurity on Smartphones (UCSph) - Windows Phone Operating System (Article 2) he Windows Phone was first known as Windows Mobile in its early days, until Microsoft recognized the need to adapt and innovate in response to the competitive landscape of the smartphone market. After the changes introduced by Apple (iOS) and Google (Android) in 2007, Microsoft decided to take a new direction and created Windows Phone as a response...Read PDF
2024
Understanding Cybersecurity on Smartphones (UCSph) - iOS Operating System (Article 1) The smartphone is one of the most remarkable inventions in contemporary human history and is currently the most widely utilized electronic device globally. Its evolution has transformed modern communication technology, allowing us to communicate efficiently and instantly across vast distances worldwide...Read PDF
Understanding Cybersecurity Management in DeFi (UCM-DeFi) – Blockchain Security (Article 4) In today’s digital landscape, blockchain technology has emerged as a powerful force, revolutionizing sectors like healthcare, finance, government, and commerce with its unparalleled security features. However, as with any technological advancement, it has not been immune to the cunning tactics of cybercriminals...Read PDF
2023
Understanding Cybersecurity Management in DeFi (UCM-DeFi) – DeFi Platforms (Article 3) With the help of blockchain and smart contracts, DeFi platforms are shaking up the financial industry by offering a wide range of services without the need for intermediaries like banks or brokerages. From lending and borrowing to trading and even gaming, DeFi is changing the way we access financial services...Read PDF
Understanding Android Malware Families (UAMF) – Adware and Backdoor (Article 5) Mobile adware refers to the advertising material hidden inside legitimate apps infected by malware. Most of these apps are available from third-party sources. Adware continuously shows unwanted advertisements on mobile screens even if the user attempts to force-close the app...Read PDF
2021
Understanding Android Malware Families (UAMF) – Riskware – is it worth it? (Article 4) Riskware is defined as a legitimate program that presents potential risks to the security vulnerabilities on a device. Although it is a legitimate program, bad actors use Riskware to steal information from the device and redirect users to malicious websites or perform functions at the expense of device security...Read PDF
2021
Understanding Canadian Cybersecurity Laws: refactored — our series in summary (Article 10) In this tenth and final article in our Understanding Canadian Cybersecurity Laws series, we will look back through the previous nine articles and revisit the topics covered in each of them. Our journey begins with the first article, The Foundations, first published by IT World Canada on January 13, 2020... Read PDF