GET UP TO SPEED ON ALL THINGS CYBER

We facilitate the exchange of crowdsourced cyber insights, experiences and differing opinions that challenge the status quo.

Our mission is to elevate cybersecurity awareness and defense through the content we generate. All of our original content is steered by our Content Advisory Committee, comprised of cyber leaders that you recognize and trust.

Our audience is diverse, ranging from CXO and board members, to members of the public with an interest in IT security such as students and business owners. Discussions address topics in business and personal security. Content published on Cyber Business Review is always ungated and freely available.

LATEST CYBER NEWS

02/02/2024 U.S. government sanctions Iranian officials over Pennsylvania water facility hack

The Iranian attack targeted a device manufactured by an Israeli company. (read more)

- - - - - - - - - - - - - - - - - - - - - -

01/29/2024 Wow! Mother of all breaches reveals 26 billion records: what we know so far

The supermassive leak contains data from numerous previous breaches, comprising an astounding 12 terabytes of information, spanning over a mind-boggling 26 billion records.  (read more)

- - - - - - - - - - - - - - - - - - - - - -

01/22/2024 Smartphone ambient light sensors allow spying

Android and iPhone ambient light sensors can be turned into cameras, allowing malicious actors to secretly film unsuspecting victims and their surroundings. (read more)

Deception = Distraction + Decoy

Deception = Distraction + Decoy

29-May | Written by Steve Tso
Phishing is a form of deception, and deceptions are comprised of two components: a distraction, and a decoy. The greater the distraction, the more effective the decoy. Both work together to entice its victims to commit. CV-19 represents an impactful distraction that’s prolonged. And hackers are taking advantage by pairing CV-19 with a myriad of relatable decoys. This article discusses the ramification of this through the lens of a typical Canadian family.

Read More
Buckle Up! Because Cyber Saves Lives

Buckle Up! Because Cyber Saves Lives

11-May | Written by Steve Tso
Similar to not wearing a seat belt, not taking cybersecurity preventative measures is irresponsible. In this article, I draw a comparison between the two and explain how getting to the point of being numb with something that’s clearly in the wrong doesn’t make it right. I then discuss the origins of Cyber Business Review, how it works, and how you can get involved.

Read More

SUBSCRIBE TO OUR NEWSLETTER
to receive news and updates

By signing up, you agree to our Privacy Policy.