Emerging Tech Security
AI security and safety, cyber-kinetic security, 5G and mIoT security, blockchain and crypto security, and other emerging technology risk domains adjacent to quantum.
-
Cryptography in a Modern 5G Call: A Step-by-Step Breakdown
Modern telecommunications networks rely on multiple layers of cryptography at every step of a call or data session. Understanding the complexity of the process and the amount of cryptography involved is critical for post-quantum migration planning - an initiative some…
Read More » -
Cybersecurity and Cryptographic Innovation in Canada
Canada has long punched above its weight in advanced technologies - from pioneering work in AI to early breakthroughs in quantum computing and blockchain. This innovative spirit extends to the domains of cybersecurity and cryptography, where Canadian researchers and companies…
Read More » -
Tracing Private Cryptocurrencies
Many believe total anonymity is possible using privacy enhanced cryptocurrencies. It might not always be the case. Are popular cryptocurrencies like Bitcoin and Ethereum private? Absolutely not. There are privacy enhancing tools and techniques that can be used to obscure…
Read More » -
Explainable AI Frameworks
Trust comes through understanding. As AI models grow in complexity, they often resemble a "black box," where their decision-making processes become increasingly opaque. This lack of transparency can be a roadblock, especially when we need to trust and understand these…
Read More » -
The 5 Most Common Crypto Scams and How to Avoid Them
The DeFi revolution presents new risks and challenges for innovators, regulators, cybersecurity experts and early adopters of the powerful technology. These are the top 5. “Where money goes, crime is never far behind.” In our new digital world this age-old…
Read More » -
The Other Side of NFT – The Scams and the Threats
In November 2021, a popular Twitter user and cryptocurrency enthusiast @Oxflim tweeted about a particularly nasty incident that happened to him. He lost his NFT collection, worth over 300 ETH, in the blink of an eye. “My primary wallets were…
Read More » -
Meta-Attacks: Utilizing Machine Learning to Compromise Machine Learning Systems
Meta-attacks represent a sophisticated form of cybersecurity threat, utilizing machine learning algorithms to target and compromise other machine learning systems. Unlike traditional cyberattacks, which may employ brute-force methods or exploit software vulnerabilities, meta-attacks are more nuanced, leveraging the intrinsic weaknesses…
Read More » -
How Saliency Attacks Quietly Trick Your AI Models
"Saliency" refers to the extent to which specific features or dimensions in the input data contribute to the final decision made by the model. Mathematically, this is often quantified by analyzing the gradients of the model's loss function with respect…
Read More » -
Batch Exploration Attacks on Streamed Data Models
Batch exploration attacks are a class of cyber attacks where adversaries systematically query or probe streamed machine learning models to expose vulnerabilities, glean sensitive information, or decipher the underlying structure and parameters of the models. The motivation behind such attacks…
Read More » -
Securing Society 5.0
A term first coined by the Japanese government, “Society 5.0” describes “A human-centered society that balances economic advancement with the resolution of social problems by a system that highly integrates cyberspace and physical space.” The fifth evolution of the society,…
Read More » -
Quantum Computing – Looming Threat to Telecom Security
Since the early 2000s, the field of quantum computing has seen significant advancements, both in technological development and in commercialization efforts. The experimental demonstration of Shor's algorithm in 2001 proved to be one of the key catalyzing events, spurring increased…
Read More » -
A Comparison of 5G Core Network Architectures
The 5G Core network is a Service Based Architecture. It evolves the traditional appliance based 4G Core Network to support services. It offers more agility and flexibility. The major building blocks of this architecture include Service-Based Interface: The Service Based…
Read More » -
How Model Inversion Attacks Compromise AI Systems
A model inversion attack aims to reverse-engineer a target machine learning model to infer sensitive information about its training data. Specifically, these attacks are designed to exploit the model's internal representations and decision boundaries to reverse-engineer and subsequently reveal sensitive…
Read More » -
When AI Trusts False Data: Exploring Data Spoofing’s Impact on Security
Data spoofing is the intentional manipulation, fabrication, or misrepresentation of data with the aim of deceiving systems into making incorrect decisions or assessments. While it is often associated with IP address spoofing in network security, the concept extends into various…
Read More » -
How KuCoin Survived a Massive Hack of $285M Worth of Crypto Assets
When attacked, some crypto projects and exchanges buckle and fold under pressure; KuCoin set the standard in 2020 for how to react to crypto hacks, even on the largest scale. KuCoin is a Singapore-based crypto exchange that consistently ranks among…
Read More »











