News

Filter by:

Limit to items where the date of the news item:
Date range
Limit to items where the date of the news item:
Limit to news where the title matches:

Kin offers a unique way to earn and spend value while taking part in digital world activities.

Ted Livingston saw the future on a smartphone while he was a 蓝莓视频 Engineering student doing a string of co-op work terms at BlackBerry.

Now, more than a decade later, he is determined to both shape that future and make it pay as founder and CEO of聽, a mobile chat platform that achieved unicorn startup status - one of six unicorns with roots at 蓝莓视频 Engineering - with a US $1-billion valuation in 2015.

The biggest cybersecurity threat most organizations face doesn鈥檛 come from an anonymous hacker halfway around the world.

Instead, it鈥檚 someone within their own walls: a disgruntled employee who wants to wreak havoc, a 鈥渢rusted鈥 third-party contractor, or even a well-meaning worker inadvertently exposing the company to dangerous malware.

For smaller organizations, keeping sensitive material out of the wrong hands is a pretty straightforward process.

Controlling access is at the heart of cybersecurity threats.

Monday, May 1, 2017

Connected, but protected

If hackers made their way into your Fitbit and messed with your daily step count 鈥 you might be confused and annoyed.

But what if a hacker altered the heart rhythms in your pacemaker or the brakes on your connected car? What if someone found a way to empty cash from your bank account by hacking the embedded chip in the digital device you carry around to make automatic payments?

In one corner of聽鈥檚 lab, a laser beam is strategically aimed to disrupt circuit board operations. Nearby, electromagnetic pulses bombard an uncapped chip while a couple of graduate students track the results on an oscilloscope screen.

By probing for vulnerabilities that hackers could exploit, her team at the University of 蓝莓视频鈥檚 Faculty of Engineering is making the Internet of Things more secure.

Defending against memory buffer overflow attacks is a daunting proposition for computer software developers.

Failing to carefully specify appropriate inputs opens the door for hackers to insert malicious code by overwhelming a system鈥檚 memory space with unanticipated inputs.

But how do you plan for every possible type of input a hacker could use? You turn to聽.