Cybersecurity Blog

Campuses seeing the “trusted friend” credential stealing attack – 09/06/19



With the start of the new school year scammers and hackers galore begin targeting students once again. Usually though, it is a complete stranger who is compromising our data not someone we trust. Welcome to 2019 when even your friends cannot be trusted to use your credentials for their personal gain.

A Canadian university has seen a student fall victim to a Snapchat credential stealing attack. The unfortunate student was asked by a trusted friend for their Snapchat credentials. When the student handed them over, their friend then send messages to all of his contacts. The messages explained that he was having trouble accessing a class timetable or a library resource and asked for the contact’s username and password to their school account so they could get the information.

Shortly after, the trusted friend attempted to use the victimized student’s credentials to login to their student account. The attempt was blocked and the account was locked down. As of the writing of this article, we are unaware if the trusted friend was sent any other credentials. However, the victimized student had to do some serious damage control with their friends on their contact list.

This is a gentle reminder not to trust anybody with your login credentials. Not your colleague, not your best friend, not your significant other nor that friend looking for help accessing information. If a friend  or colleague is asking for credentials so they can access information, send them to the IT Service Desk. They will be glad to help.


Is it spam or is it phishing? 05/23/19



I am truly delighted with the number of malicious emails that are being forwarded to  The Mount Royal community is doing a great job of letting us know what to look for and helping us defend their data. There is one question that people keep asking though, what is the difference between Spam and a phishing email? I thought I would take a moment to clarify.

Spam email
  • Goal is to sell you something.
  • It is sent to hundreds or thousands of people at a time.
  • Reading the email does not generate an emotional response.
  • It may or may not contain links
  • Clicking on the links will take you to the organizations website.
Phishing email
  • Goal is to steal your data or use your workstation as a tool to access data on other people’s devices.
  • It can be sent to thousands of people or just one or two.
  • Reading the email generates an emotional response.
  • It may or may not contain links and or attachments.
  • Clicking on the link or opening an attachment takes you to a fake web page and/or loads malware onto your device.

The easiest way to determine if what you are dealing with is spam or phishing is by examining the purpose of the email. If it looks like they are trying to sell you something, then it is probably spam. If it looks like they are trying to confuse or trick you, then it is likely phishing.

Spam emails should be marked as spam by clicking the stop sign icon in the Gmail menu bar. Phishing emails should be forwarded to If you aren’t sure which one it is, forward it to and we can let you know.


Your legitimate Android app may contain malware – 03/14/19



When developers create apps, they often include advertising in exchange for using the app for free. To make their lives easier, they will often use a software developer kit (SDK). This is a bunch of code designed to deliver ads that is created by another developer. Using a SDK can save developers tons of time so they can focus on the unique features of their app instead of reinventing the wheel.

Unfortunately one developer decided to add some special features to the SKD they created. The features turned the innocent adware into malware by hiding the app icon, sending users to specific web pages and opening the Play Store to specific apps. In other words, it made legitimate apps annoying as heck to use and difficult to get rid of. It also allowed the criminals to download apps behind the users back, making the legitimate apps dangerous as well.

This SDK was used in hundreds of apps, allowing the criminals to spread their malware throughout the Play Store and affecting almost 150 million users.

Affected apps

Snow Heavy Excavator Simulator
Hoverboard Racing
Real Tractor Farming Simulator
Ambulance Rescue Driving
Heavy Mountain Bus Simulator 2018
Fire Truck Emergency Driver
Farming Tractor Real Harvest Simulator
Car Parking Challenge
Speed Boat Jet Ski Racing
Water Surfing Car Stunt
Offroad Wood Transport Truck Driver 2018
Volumen booster & Equalizer
Prado Parking Adventure
Oil Tanker Transport Truck Driver
Monster Truck Demolition
Hummer taxi limo simulator
Excavator Wrecking Ball Demolition Simulator
Offroad Gold Transport Truck Driver 2018
Sea Animals Truck Transport Simulator
Water Surfing Motorbike Stunt
Police Chase
Police Plane Transporter
Ambulance Driver Extreme Rescue
Hovercraft Racer
Cars Transport Truck Driver 2018
Motorbike Pizza Delivery
Heavy Excavator – Stone Cutter Simulator
Bottle shoot archery
Offroad buggy car racing
Garbage Truck – City trash cleaning simulator
Tanks Attack
Dinosaur Park – Train Rescue
Pirate Ship Boat Racing 3D
Flying taxi simulator
Jetpack Water
Volumen Booster
Animal Farming Simulator
Monster Truck
Offroad jeep car racing
Flying Car Stunts On Extreme Tracks
Tractor Farming 2018
Impossible Farming Transport Simulator
Volumen Booster
Mustang Rally Championship
Deleted Photo Recovery
Speed Boat Racing
Super Cycle Jungle Rider
My name on Live Wallpaper
Magical Unicorn Dash
Super Cycle Jungle Rider
Love Caller Screen
Racing Car Stunts On Impossible Tracks
Racing Car Stunts On Impossible Tracks 2
Urban Limo Taxi Simulator
Tractor Farming Simulator
Camper Van Driving
Bottle Shoot Sniper 3D
Full Screen Incoming Call
Beard mustache hairstyle changer Editor
Volumen Booster
girlfriend photo editor
Mobile Number Tracker & Locator
Garden Photo Editor
Fortune Wheel
Farming Transport Simulator 2018
OffRoad Tractor Transport
my name on live wallpaper
Flying Ambulance Emergency Rescue
Mustang Driving Car Race
Waterpark Car Racing
Impossible Tracks – Extreme Trucks
Flying Motorbike Stunts
Fire Truck Emergency Rescue – Driving Simulator
Heavy Snow Excavator Snowplow Simulator
Water Skiing
Women Make Up and Hairstyle Photo Maker
Mountain Bus Simulator
Van Pizza
Truck Transport and Parking Simulator
Hoverboard Racing Spider Attack
Motorsport Race Championship
Demolition Derby
Love Caller with love ringtones
House Transport Truck – Moving Van Simulator
Heavy Excavator Stone Driller Simulator
Super Cycle Downhill Rider
Extreme Rally Championship
Missile Attack Army Truck
Caller Location & Mobile Location Tracker
Mobile number locator
My name on Live Wallpaper
City Metro Bus Pk Driver Simulator 2017
Full Screen Incoming Call
Man Casual Shirt Photo Suit
American muscle car race
Offroad Nuclear Waste Transport – Truck Driver
Mad Cars Fury Racing
High Wheeler Speed Race
Number Coloring
Camper Van Race Driving Simulator 2018
Unicorn Float – Speed Race
Dual Screen Browser
Harvest Timber Simulator
Hot Micro Racers
Lara Unicorn Dash
Wingsuit Simulator
Food Truck Driving Simulator
Dog Race Simulator
SUV car – parking simulator
Phone Finder
Phone number locator
Gallery Lock
Secret screen recorder
Face Beauty Makeup
Christmas letters to santa and three wise man
Deleted Files recovery
Dual Screen Browser
Broken Screen – Cracked Screen
Garden Photo Editor
Modi Photo Frame 2
Love Caller Screen
Anti Theft & Full Battery Alarm
Love Caller Screen 2
Voice reading for SMS. Whatsapp & text sms
Name on Pic-Name art
Speed Boat Racing
Train Driving Simulator
Super Cycle Rider
Racing Horse Championship 3D
Move App To SD Card 2016
Pop Toy Creator
Photo Live Wallpaper
Magical Unicorn Dash
Truck Wheel of Death
Live Translator
Volume Control Widget
World cup 2018 football shirt maker
Girlfriend Photo Editor 2
My Photo on Music Player
Garden Photo Editor
Fortune Wheel Deluxe
Extreme Motorcycle Racer
Offroad Snow Bike – Christmas Racing
Bottle Shoot
Photo Background Changer 2017
Offroad Christmas Tree Transport
Tank Transport Army Truck
Flag face paint: World Cup 2018
World Cup 2018 Teams Flags Live Wallpaper
Selfie Camera
Missile Attack Army Truck
Max Player
Flash Alert – Flash on Call
Photo Video Maker with Music
Brain Games & IQ Test
Audio Video Mixer
Pop Toy Creator 2
Flash on Call and SMS
Heart Photo Frames
Shayari 2017
Photo on Birthday Cake
Nature Photo Frames
Calendar 2018 Photo Frame
Christmas Truck Transport Simulator
Modern Santa – Christmas van drive
Change your voice
Moster vs Water
EDIT Flowers Photo Frames
Photo Video Maker with Music
Toilet Paper Race
Dog Crazy Race Simulator
Luxury Photo Frame
Bike Wheel of Death
World Famous Photo Frames
Heavy Snow Excavator Christmas Rescue
Deleted Files Recovery
Football Results & Stats Analyzer
3D Photo Frame Cube Live Wallpaper
Green Hill PhotoFrame
Christmas Magic Board
Animal Parts Photo Editor
DSLR Camera Blur
Car Photo Frame
Hands Slap Game
4D Maa Durga Live Wallpaper
Men Sweatshirt Photo Editor
Connect Letters. Words Game
Recover Deleted Pictures
Custom Radio Alarm Clock
Anti-spam Calls
Compatibility Test
Dual Screen Browser
Magic Glow Live Wallpaper
Porgy Virtual Pet
Tap the Ball
Clock Live Wallpaper
Royale Stats
Fire text photo frame
Christmas greetings card
Best App Lock
DJ Photo Frames
Auto Call redial
Guess the picture

If you have one of these apps on your phone, you should uninstall it. If you are unable to locate the icon, you may have to do a factory reset to remove it.



Fake Norton Security scam loading malware onto computers – 02/19/19



Norton is reporting there is a new tech support scam that is impersonating their antivirus software.  This is how it works, after visiting a compromised or malicious website users see a dialog box popup titled Windows Alert. It warns the user that their PC may be infected and asks if they want a 10 second quick scan performed.

Once the user clicks OK in the dialog box, several new windows that look a lot like a Norton security scan start popping up. Of course the scan appears to find a virus and then asks you to download and install an antivirus update. If you proceed with their request,  an annoying piece of malware is downloaded onto your machine. Nasty business indeed!

Unfortunately, Norton is not the only piece of software the scammers are impersonating. These creative criminals have also been impersonating Microsoft 360, prompting users to download driver updates.

The good news is, with a little knowledge you can protect yourself from these types of scams.

What you need to know:

  • Files cannot be scanned for viruses using a website running inside a browser. Only an application running outside of a browser can perform virus scans.
  • You will not get virus scans from applications that are not installed on your computer. Your workstation does not have Norton antivirus installed on it.
  • Drivers are automatically updated on your workstation. You will never be prompted to update them manually.
  • Closing a suspicious dialog box can download malware onto your machine. Close the entire browser window instead.

If you are at home and get a dialog box alerting you of a possible virus infection:

  1. Close the browser window.
  2. Open your antivirus application.
  3. Run a virus scan

If you get virus warning on your workstation:

  1. Don’t click on anything and leave your machine on.
  2. Disconnect from the network.
  3. Call the IT Service Desk at 403-440-6000.

If you get prompted to update an application:

  1. Close the browser window.
  2. Open the application that needs updating.
  3. Select Check for updates from the Help menu.

If in doubt, please call the IT Service Desk. They are always happy to help.


Chrome can now tell you if your password is part of a data breach – 02/07/19

Google has released an extension for Chrome that lets you know if a password you are using is part of a known data breach. If you are one of my on- the-ball readers, your reaction should be somewhere between “Hold the phone” and “No flipping way”. After all, how the heck can they check if your password is part of a breach if it doesn’t actually read your password?

Well some clever people at Google have come up with a lovely little process that keeps everything nice and secure.  So how does it work? Basically when you login to a site they take your username, encrypt and hash it and then send it to Google. Their databases of unsafe passwords are searched. When they find possible matches, they download that encrypted information to your computer. Password Checkup then decrypts the account details and checks for a match. As the final matching is done on your machine, Google doesn’t not know your account details. All of that is kept from their preying eyes.

To install this handy little tool:

1.Open the Customize and Control menu in Chrome.
2. Select More tools. Another menu appears.
3. Select Extensions. The Extensions page appears.
4. Click the hamburger in the upper left corner to view the Main menu.

5. At the bottom of the  select Open Chrome Web Store.

6. Enter Password Checkup into the search field. Password checkup appears in the drop down list.
7. Select password checkup. The Password Checkup extension appears.

8. Click Add to Chrome. A confirmation dialog box appears.

9. Click Add extension.

750 million newly compromised credentials added to data breach list – 02/01/19




Last month I told you about a huge list of compromised credentials floating around the dark web for free. Researchers at the Hasso-Plattner Institute in Germany did some more digging. They are reporting an additional 25 billion credentials are included in that list. They estimate that 750 million of those are newly compromised credentials, not seen on the dark web before.

With all these credentials available for free for any delinquent to use as they wish, the chances that your username and password are no longer secure just went up exponentially. As a result we are seeing an increase in hacked security cameras, baby monitors and other smart home devices.

Up to this point, the hackers have simply terrorized home owners. However, one family near Chicago discovered that a hacked thermostat can be dangerous when their home was jacked up to 90 degrees. The family was alerted to something being amiss when they heard a deep voice coming from a security camera in their son’s room. It wasn’t until they went upstairs to investigate did they realize how dangerously warm the room was.

To protect your family:

  1. Check security features before your buy. Look for default passwords that can be changed, firmware that can be updated and 2 step verification/authentication.
  2. Change the default password on the device
  3. Use strong effective passwords
  4. Don’t reuse passwords
  5. Enable two step verification/authentication when it is available


Password reuse results in missile alert terrifying a family – 01/24/19

A Florida family was terrorized by a notification coming from their Nest security camera alerting them of a missile launch by North Korea.  Interestingly enough, until they heard the alert the family didn’t even know the camera had speakers.



Although the traumatized mom blames Nest for not notifying their users of a data breach, it wasn’t Nest who was breached. The data breached occurred elsewhere. As the family reuses passwords, once one of their accounts was exposed it left all of their accounts vulnerable.

Although it certainly would have been a nice bit of customer service for Nest to notify their account holders that they should change their passwords if they reuse them, it is not their legal responsibility as they were not hacked. The responsibility for notification lies with the breached account provider.  The family didn’t say whether that notification was received.

Regardless of whether Nest should have notified their users or not, this poor mother still had to watch her terrified nine year old son crawl under the carpet in a panicked attempt to protect himself from nuclear missiles.  No mother should have to experience that.

How do you prevent your family from being traumatized by a prankster hacker?

  1. Be familiar with all the features of your  camera before you buy it. Know if it has a microphone or speakers, connects to the internet, whether the default password can be changed, how the firmware is updated and where recorded video is stored.
  2. Change the default password as soon as you set up the camera. Use a unique, effective passphrase.
  3. Update the camera’s firmware as soon as it is installed and keep it up to date. If it has an automatic update feature, enable it.
  4. Disconnect the camera from the internet when you aren’t using it.

Taking these steps will greatly reduce the chances of your camera being hacked. These same steps can be taken to secure any IoT device.

Our world is rapidly changing with technology creeping into all aspects of our lives. It is important that we change with it to ensure our families safety. That means we need to be aware of the risks associated with the devices that we bring into our homes and how to mitigate them. As this Florida family has learned, tech companies aren’t going to do this for us.


Are your credentials part of the latest data breach? – 01/17/19



Troy Hunt, the creator of Have I Been Pwned has just found a massive collection of usernames and passwords sitting on the web.  When I say massive, I mean massive. We are talking 1,160,253,228 unique login credentials (usernames and passwords).  We have seen large dumps of credentials for sale on the web before. However there has never been a collection of this size.

This alone is concerning, but when you also consider that the information is not sitting hidden in some dusty corner of the dark web, but being openly discussed in various forums the alarms bells start to sound. Add the fact that the information is being given away and not sold and you have reached DEFCON 1. Now any miscreant with time on his hands can start banging away at websites with a free list of easily found credentials. This greatly increases the chance your account(s) will be compromised.

It’s a like finding a garage door opener while out for a walk with your dog. You may not have been planning on breaking into a garage, but when fortune smiles upon you, you take advantage of it and pick up that sucker and start seeing which doors it opens.

The good news is there are things you can do to protect yourself.

  1. Visit Have I Been Pwned and find out if you are affected.
  2. Change the passwords on affected accounts as well as any accounts using the same password.

If you aren’t reusing passwords, this is a relatively easy task. If you are then it sucks to be you and it may take you a while.  On the up side,  you do get to give those brain cells a good workout trying to remember all the accounts that used that password. I lied, that sucks to.

After changing umpteen passwords and straining to remember the names of all your accounts, you may want to stop reusing them and start using a password manager.  KeePass is sitting on your workstation and is free to download and use at home. Give Verle Winsor a call to find out how to use it.

If you are ready to invest in a more user friendly tool, you may like Dashlane, 1Password, or LastPass .  They all generate effective unique passwords for you and make logging in a breeze on all of your devices.



Hotel chain data breach 11/30/18



Have you stayed at one of the following hotels in the past 4 years?

  • W Hotels
  • St. Regis
  • Sheraton Hotels & Resorts
  • Westin Hotels & Resorts
  • Element Hotels
  • Aloft Hotels
  • The Luxury Collection
  • Tribute Portfolio
  • Le Meridien Hotels & Resorts
  • Four Points by Sheraton
  • Design Hotels

Lucky you!!  There is a possibility your name, mailing address, phone number, email address, passport number, Starwood Preferred Guest account information, date of birth, gender, arrival and departure data, reservation dates and/or  credit card information were stolen in a data breach.  Marriott has reported an unauthorized access to their guest reservation database was made on or before Sept 10 of this year.  However they acknowledge that the criminals have been inside the company’s network since 2014.

In response they have set up a dedicated website, established a call center to answer questions and will be emailing those affected. To make their customers feel better they are also offering a free on year subscription to an internet monitoring service. When a subscriber’s personal information is found on the web, they are  notified.  This service is available to customers in Canada.

If you think you may have been affected, visit the website for more information and look for signs of identity theft.


Beware the online gift exchange – 11/29/18



The Better Business Bureau is reporting that Facebook and other social media sites are seeing a resurgence of the “Secret Sister” gift exchange.  This gift exchange and others like it, promise participants several  gifts in exchange for sending one inexpensive gift. All you have to do is give up some personal information and invite your friends to join.  If you think this sounds too good to be true, you would be right.

This scam is a classic pyramid scheme which is illegal in both Canada and the US. If you run across one of these gift exchanges on social media, report the post immediately.