
Week 4 of Cyber Month: The Most Proactive Generation.
To protect against data loss from cyber attacks like ransomware, schedule and automate backups on personal and business devices. Regularly test these backups to ensure they can be restored without issues. Choose a safe storage solution, whether it’s cloud storage, external hard drives, or a mix of both, to keep your data secure.
Enhance your business’s cybersecurity by educating your team about threats and best practices through regular training. Develop and regularly update an incident response plan to manage cyber incidents effectively.
For remote or hybrid work, ensure employees use secure Wi-Fi, a VPN, and follow your cybersecurity policies. Equip them with the tools and training necessary for maintaining a secure work environment.
Overall, being proactive and prepared in your cybersecurity practices will help you and your business stay safe as part of Generation Cyber Safe!
Read More: Government of Canada

Eight underestimated Phishing techniques.
Email phishing remains the most common type of phishing, but attackers are increasingly using various lesser-known techniques. Here’s a brief overview of some key methods:
Content Injection Attacks: Scammers manipulate vulnerable websites to inject harmful content or links, tricking users into sharing sensitive data.s and engaging in ongoing training can significantly reduce vulnerability to these cyber threats. Always think before you click.
SEO Poisoning: Scammers create fake websites optimized for search engines to lure victims searching for terms like “download Photoshop.” They may also hijack legitimate Google business listings.
Paid Ad Scams: Attackers use online ads to direct users to malicious sites, often embedding malware in ads (malvertising).
Social Media Phishing: Threat actors create fake accounts to impersonate trusted figures, promote malicious apps, or lure users into clicking harmful links.
QR Code Phishing (Quishing): Scammers place malicious QR codes on various materials, tricking users into scanning them, leading to phishing sites.
Mobile App Phishing: Malicious apps disguised as legitimate ones are uploaded to app stores, stealing personal data from users.
Call Back Phishing: Attackers encourage victims to call back a fraudulent number, often using forms or SMS to initiate contact.
Cloud-based Phishing: As organizations use cloud services more, attackers exploit platforms like Microsoft Teams to send phishing messages.
Read More: SecurityWeek

Meta and Snap spending billions on AR glasses.
After years of development and significant investment, Meta CEO Mark Zuckerberg unveiled an ambitious augmented reality prototype called Orion in September. Just a week earlier, Snap CEO Evan Spiegel introduced the 5th-generation Spectacles with AR capabilities. Both companies envision AR glasses potentially replacing smartphones as the next major computing platform.
Chris Cox, Meta’s chief product officer, described this advancement as a significant leap in technology, aimed at defining the future of computing. Major tech companies have long pursued augmented and mixed reality; Apple recently launched its Vision Pro headset, while Google’s early attempt, Google Glass, was ultimately canceled. Microsoft also invested heavily in AR but discontinued its HoloLens due to lack of traction.
Experts like Tuong Nguyen from Gartner note that while the potential for AR is promising, the technology still has a long way to go before reaching maturity. Both Snap and Meta’s AR prototypes are not ready for consumer sale, as production costs remain high. Meta plans to use Orion internally for software development, while Snap will rent its Spectacles to developers for a monthly fee, aiming to foster a broader ecosystem for AR technology.
Read More: CNBC