Skip to main content Skip to local navigation
Home » Blogs

Blogs

Understanding current cybersecurity challenges in law (UCCCL) – Legal Considerations for Artificial Intelligence and Technological Development (Article 6)
With strong competition among countries around the world to become cutting edge leaders in AI, artificial intelligence has been a driving force of innovation in the digital economy. Indeed, Canada has been working to place itself among other global leaders in dynamic AI development, with the Canadian artificial intelligence sector receiving….Read PDF 2022

Understanding current cybersecurity challenges in law: Data Breaches and Increased Data Awareness (Article 5)
Data breaches are incidents in which information is stolen or taken from a system without the knowledge or authorization of the owner of that system. Data breaches can expose confidential, sensitive, or protected information to an unauthorized person or …Read PDF 2022

Understanding current cybersecurity challenges in law: balancing responsibilities in digital content censorship (Article 4)
Public broadcasting regulations and legislation have long provided the regulations for information which is shared in the public domain, including newspaper, radio, and television. During the COVID-19 pandemic we saw many of our family, friends, colleagues, and acquaintances…Read PDF 2022

Understanding current cybersecurity challenges in law: determining online jurisdictional authority (Article 3)
When a crime takes place or a dispute occurs between two parties who reside within the same geographic location, the determination of which law applies to that scenario is easily distinguished as being the law of that geographic location. When a dispute occurs between two parties …Read PDF 2022

Understanding current cybersecurity challenges in law: digital governance and social responsibility meet user-generated content (Article 2)
Digital governance refers to the strategic management of a governing body or corporation, over that which is connected to their position and function online – including the impacts of their actions in that position…Read PDF 2022

Understanding current cybersecurity challenges in law: data sovereignty & cross-border data transfers (Article 1)
Most of us would likely be unsurprised to learn that the vast majority of our personal and professional data is stored in the cloud. The most popular social media apps – such as Instagram, Twitter, Facebook, and LinkedIn – all use cloud-based data storage for user accounts, profiles, uploaded content, and more…Read PDF 2022

Understanding cybersecurity management for FinTech: cybersecurity policy and strategy management (Article 6)
Cyber-attacks are on the rise with every passing day, and so is the cost associated with the damage caused by them. To protect the financial institutions from the menace of these cyber-attacks, a cybersecurity policy and strategy sets the standards to: monitor cyber activities on premises,…Read PDF 2022

Understanding cybersecurity management for FinTech: security issues on financial market infrastructures (Article 5)
Financial market infrastructure (FMI) serves as the backbone of financial markets. It allows financial transactions to take place between people, financial institutions, and businesses in a cheaper and more efficient manner. It is the key component between financial institutions that exchange payments,…Read PDF 2022

Understanding cybersecurity management for FinTech: cybersecurity vulnerabilities and risk in FinTech (Article 4)
FinTech revolves around technologies such as cloud, blockchain, AI, and mobile devices that are used for financial transaction payments, cryptocurrencies, money transfers, trading, and regulatory compliance. With so much monetary value associated with all these technologies,…Read PDF 2021

Understanding cybersecurity management for FinTech: cybersecurity threats in FinTech (Article 3)
With a plethora of digital wallet methods, financial cyber risks such as fraudulent transactions, extortion, denial of service attacks, and credit card fraud have become frequent. These cyber-attacks are capable enough to cause systemic risk to the financial sector…Read PDF 2021

Understanding cybersecurity management for FinTech : information security governance in FinTech (Article 2)
Information is the key to success in the contemporary era. Just as there are two sides of a coin, there are two perspectives of a cyber-attack. On one hand, attackers seek information to take advantage of potential flaws in an organization’s architecture, processes, and design; exploiting these flaws to make money…Read PDF 2021

Understanding cybersecurity management for FinTech (UCMF) – introduction to FinTech and the importance of security objects (Article 1)
FinTech encompasses a wide array of technological strategies, many of which have either improved the functionality of existing financial products and services or enabled the development of novel technological solutions for the financial sector. With the rapid growth of digital platforms, …Read PDF 2021

Understanding Android Malware Families (UAMF) – file infector and potentially unwanted applications (Article 6)
File infector is a malware that attaches itself to APK files, which contain all the data related to an Android application. File infector gets installed with APK files, and it gets executed when the APK file is installed. The APK file can be any Android application such as a game, word processing file, …Read PDF 2021

Understanding Android Malware Families (UAMF) – Adware and Backdoor (Article 5)
Mobile adware refers to the advertising material hidden inside legitimate apps infected by malware. Most of these apps are available from third-party sources. Adware continuously shows unwanted advertisements on mobile screens even if the user attempts to force-close the app…Read PDF 2021

Understanding Android Malware Families (UAMF) – Riskware – is it worth it? (Article 4)
Riskware is defined as a legitimate program that presents potential risks to the security vulnerabilities on a device. Although it is a legitimate program, bad actors use Riskware to steal information from the device and redirect users to malicious websites or perform functions at the expense of device security…Read PDF 2021

Understanding Canadian Cybersecurity Laws: refactored — our series in summary (Article 10)
In this tenth and final article in our Understanding Canadian Cybersecurity Laws series, we will look back through the previous nine articles and revisit the topics covered in each of them. Our journey begins with the first article, The Foundations, first published by IT World Canada on January 13, 2020… Read PDF 2021

Understanding Android Malware Families (UAMF) – Ransomware and scareware (Article 3)
Ransomware is malicious software used by individuals to encrypt documents on computers or digital devices. Perpetrators demand a ransom from the owner of a device to access the victim’s documents; once in, criminals install ransomware on their mobile phone or computer… Read PDF 2021

Understanding Canadian Cybersecurity Laws: Legislative Modernization — Responding and Adapting to Technological Change in a Global Domain (Article 9)
In this article, we will discuss the Digital Charter Implementation Act, 2020, which was tabled by the government on November 17, 2020, along with its progeny: the Consumer Privacy Protection Act (CPPA) and the Personal Information and Data Tribunal Act… Read PDF 2021

Understanding Android Malware Families (UAMF) – The Trojan: An impersonator in the background (Article 2)
The trojan is a sneaky impersonator that behaves like a legitimate program. It can hide in the background and steal information from the device. Trojan samples often delete, modify, block, and copy data to disrupt services provided by the operating system… Read PDF 2021

Understanding Android Malware Families (UAMF) – The Foundations (Article 1)
Android malware is one of the most serious threats on the internet and has witnessed an unprecedented upsurge in recent years. There is a need to share the fundamental understanding of behaviour… Read PDF 2021

Understanding Canadian Cybersecurity Laws: Measuring Up — Outlining Existing National Cybersecurity Legislation in Canada, the UK, Australia, and the US (Article 8)
In this article, we will outline the relevant national privacy and cybersecurity-related laws currently in effect in the United Kingdom, Australia, and the United States, as fellow common law countries… Read PDF 2020

Understanding Canadian cybersecurity laws: Deep, dark, and undetectable – Canadian jurisdictional considerations in global encrypted networks (Article 7)
The rapid growth of encryption technology has revolutionized the online marketplace and helped to enable the creation of anonymous online networks, like the Dark Net … Read PDF 2020

Understanding Canadian cybersecurity laws: Peer-to-peer privacy protection – “Intrusion upon seclusion” and the protection of intimate images (Article 6)
The prevalence of digital communication has created nearly limitless possibilities for the rapid, large-scale sharing of private communications, intimate images, and personal information… Read PDF 2020

Understanding Canadian Cybersecurity Laws: Insert Something Clever Here – Canada’s Anti-Spam Legislation (Article 5)
As we continue to adapt to the changing demands to navigate the spread of COVID-19, an increasing number of workspaces and social interactions have had to rely much more heavily on email and … Read PDF 2020

Understanding Canadian Cybersecurity Laws: Interpersonal Privacy and Cybercrime – Criminal Code of Canada (Article 4)
The global spread of COVID-19 has been a huge catalyst in our increased reliance on digital technologies, particularly our networked communication infrastructure. With the rapid influx of demand for … Read PDF 2020

Understanding Canadian cybersecurity laws: Privacy Protection in the Modern Marketplace-PIPEDA (Article 3)
With the global spread of COVID-19, on-line scams are circulating and malicious actors have been spreading malware intended to steal individual information through both personal and corporate networks. We previously outlined… Read PDF 2020

Understanding Canadian cybersecurity laws: Privacy and access to information, the Acts (Article 2)
The Privacy Act and the Access to Information Act were both implemented by the Canadian federal government in 1985 and have acted as a starting point for more recent legislation… Read PDF 2020

Understanding Canadian cybersecurity laws: the foundations (Article 1)
The end of 2019 marked the end of a decade that has been shaped by rapid technological development, advancing data-use research, and an increasingly hyper-connective global infrastructure… Read PDF 2020