Publications
This report demonstrates the technical underpinnings of how WeChat image censorship operates and suggests possible evasion strategies.
This report demonstrates the technical underpinnings of how WeChat image censorship operates and suggests possible evasion strategies.
Investigation of a malware campaign targeting the Tibetan community and discussion of the challenges in analyzing closed espionage ecosystems.
Canadians can learn new things about your personal data by requesting access to it from companies. What can be found out varies by company and there can be some hurdles to overcome before you get access.
This report describes an inexpensive and technically simple phishing operation. It shows that the continued low adoption rates for digital security features, such as two factor authentication, contribute to the low bar to entry for digital espionage.