Security Cloud Privacy Tech

Posts

All posts on markn.ca covering cloud, security, privacy, and technology.

Terms of Service

You agree to new contracts all the time but you probably don’t think of them as contracts, they are simply the “Terms of Service”. A recent study found that most of these agreements are essentially unreadable. That sets up a one-sid...

Canadian Election Cybersecurity

Cybersecurity is a major topic when it comes to modern elections. With Canada probably going to the polls in the fall, discussion is heating up about the potential impact of cybersecurity this election cycle. The good news? Canada’s election in...

Cybersecurity Research Consequences

Security research can be a tricky thing. Depending on where you are and what jurisdiction you fall under, the research you conduct may be illegal. That can give companies who are resistant to outside researchers the ammo they need to strong arm resea...

Cryptocurrencies & Cybercrime

Cryptocurrencies have dropped in popularity and value but cybercriminals continue undeterred. The latest on cybercrime and cryptocurrency…

Facebook & The Value of Privacy

Facebook continues to do anything they can to build data profiles on users. This week it was revealed that they shifted their Onavo efforts to a new “research” project where they targeted 13-35 year olds via 3rd party market research comp...

GDPR Intentions

GDPR has been in effect for a few months and we’re starting to see the first major rulings. Google was just hit with a 50m Euro fine for not being clear enough in their intentions with user data. Is this a turning point? While regulation and l...

Facebook’s 10 Year Challenge

The 10 Year Challenge is sweeping social media right now. It’s a harmless way of looking back at yourself—and everyone else—a decade ago…or is it?

Is there something more to this challenge? Something very big brother tied t...

Zero vs. Lean Trust

Network security is struggling to keep up with the reality of how organizations are build and connect today. From hybrid network (on-premises and in the cloud) to large mobile user bases, traditional network security—push everything through a choke...

773M Credentials

It’s not uncommon for cybercriminals to combine multiple data sets in order to increase their chances of finding valid user credentials. Security researcher Troy Hunt found the mother of all collections, dubbed “Collection #1”. T...

Konmari Your Data

Data is extremely valuable. We’ve seen that with data brokers, social media giants, and almost every company out there. The current attitude is to gather all the data possible, save it forever, and monetize it later on.

That’s p...

Tracking Smartphone Data

Three articles this week each touching on smartphone data highlight a much bigger issue. Each of these articles remind us how much data our phones generate and how valuable that data is. Yet we don’t treat that data as valuable. It’s pack...

Setting Up 2019

2019 is in full effect and I’m stumbling?!?

Planning for a new year is exciting but can also be challenging. When I sat down to plan out 2019 vlogging and what topics to handle around security and privacy, I see a massive opportunity....

« Previous Page
 
Next Page »