International Women’s Day – #EmbraceEquity

Posted in Commentary with tags on March 8, 2023 by itnerd

International Women’s Day (IWD) will be celebrated globally on Wednesday, March 8. This year’s theme is #EmbraceEquity.

According to the IWD site (just one of many dedicated to this important day), International Women’s Day “is a global day celebrating the social, economic, cultural and political achievements of women. The day also marks a call to action for accelerating gender parity. Significant activity is witnessed worldwide as groups come together to celebrate women’s achievements or rally for women’s equality.”

While great strides have indeed been and continue to be made in the tech industry, it is important to note that there remains work to be done. According to Zippia, in 2022, Women held just 28% of computing and mathematical jobs in the US, and made up 34.4% of the workforce of the U.S.’s largest tech companies (Amazon, Apple, Facebook, Google and Microsoft).

Executives from Datadobi, DH2i and Imply had this to say regarding this important and timely topic: 

Erica Cronan, Global Marketing Manager, Datadobi:

“Although the message of International Women’s Day is not restricted to just one day of the year, the chosen subject for this year urges us to think explicitly about eliminating biases. The impression of what women can and cannot do is a major source of hardship for many.

We’ve come a long way in eradicating some of the stereotypes about women in technology, but we still have a ways to go. Encouraging women and allies of women worldwide to demonstrate their support in a variety of ways is crucial to breaking barriers. Look inside yourself to see what beliefs you might be holding that are still contributing to the issues that women encounter in the workplace.

In the same way, I urge women in tech to be open to mentoring new team members. We can achieve gender equity and a more balanced workplace by having strong female role models in the field. I am grateful to be a part of an organizational culture that supports diversity and encourages women to express their creativity and develop new skills. The leaders and organizations we as women must select must promote equality.” 

Francesca Corsini, US Regional Sales Manager, Datadobi:

“I am very fortunate to have strong female role models and to work for a company that values growth, support, and opportunity for everyone, equally. Their mentorship, guidance, and support helped me establish a career in tech. Hard work and dedication should not go unrecognized regardless of social, economic, racial, and religious differences and choices.

Innovation and technological breakthroughs are driven by our unique ideas, differences, and perspectives. It is our responsibility to continue building a world that fosters equal opportunity and brings a diverse set of minds to the table.”

Jamie Hawkins, Marketing Director, DH2i

“Today more than ever, women have more opportunities to create the future we want. While overcoming biases, the world’s workplaces continue to make great strides, with prevailing research touting the benefits of doing so. According to McKinsey, companies with significant female representation are 25% more likely to outperform male-dominated competitors. Likewise, Gartner research states that inclusivity can improve team performance by as much as 30%. 

I myself am fortunate to work for a company that fosters an inclusive workplace that empowers every individual to reach their full potential. Beyond ethical motivation, DH2i recognizes that an inclusive workplace is a powerful business strategy that brings a rich variety of backgrounds, experience and thought-processes to the table. In doing so, organizations can enjoy fresh approaches to problem solving, original thinking and innovation that result in significant competitive advantage, greater profits, increased shareholder value and long-term success.” 

Juleen Konkel, General Counsel, Imply (https://imply.io/):

“Although we only celebrate it one day out of the year, the spirit of International Women’s Day is something we should take with us and remember every single day. That spirit of creating a world where we see and recognize the contributions of women on this planet.

It’s especially important that the spirit of International Women’s Day carries over into the business world. Businesses thrive on innovation and creative ideas, and it’s proven that the best way to fuel innovation is to create a workplace that is diverse and inclusive. Inviting women to a seat at the table and to participate will challenge each other to work harder and think critically and more broadly — ultimately resulting in new opportunities and more success. Conversely, teams who are not mindful of this are more likely to become complacent and stagnant, unable to think outside an ever shrinking box. 

This year’s International Women’s Day theme of #EmbraceEquity is very fitting as it’s a time for businesses to look at the conversations they are having about the future and encourage those voices not often heard. Not only will it have positive effects on their bottom line, but it will also have positive impacts on their communities and the world for years to come.”

BBC Reports On Twitter Being Unable To Protect Users From Trolling And Other Evils Under Elon Musk…. And The Reporter Behind The Story Gets Death Threats As A Result

Posted in Commentary with tags on March 8, 2023 by itnerd

Twitter has become a toxic swamp of hate under Elon Musk. There’s honestly no question about that. And its being highlighted by this story from the BBC which illustrates that perfectly:

Twitter insiders have told the BBC that the company is no longer able to protect users from trolling, state-co-ordinated disinformation and child sexual exploitation, following lay-offs and changes under owner Elon Musk.

Exclusive academic data plus testimony from Twitter users backs up their allegations, suggesting hate is thriving under Mr Musk’s leadership, with trolls emboldened, harassment intensifying and a spike in accounts following misogynistic and abusive profiles. 

Current and former employees of the company tell BBC Panorama that features intended to protect Twitter users from trolling and harassment are proving difficult to maintain, amid what they describe as a chaotic working environment in which Mr Musk is shadowed by bodyguards at all times. I’ve spoken to dozens, with several going on the record for the first time.

The former head of content design says everyone on her team – which created safety measures such as nudge buttons – has been sacked. She later resigned. Internal research by Twitter suggests those safety measures reduced trolling by 60%. An engineer working for Twitter told me “nobody’s taking care” of this type of work now, likening the platform to a building that seems fine from the outside, but inside is “on fire”.

Twitter has not replied to the BBC’s request for comment.

I encourage you to read this full story as it paints a really ugly picture of what Twitter has become under Elon Musk. If you’re in the UK, I also encourage you to watch this BBC Panorama documentary which also details how bad Twitter is under Elon Musk. It’s truly mind blowing.

Now I was going to post everything that I wrote above as part of this story. But I ended up breaking this story into a separate one to add more details. Specifically this which was brought to light by a reader of the blog this morning:

What you see here is Elon basically giving Twitter users who follow him the permission to harass and threaten anyone he doesn’t like. In this case, this reporter who highlighted how bad Twitter has become under Elon. That by any standard is unacceptable. The fact is that Elon is a bully, and like most bullies he’s a scared one as apparently he walks around with bodyguards who even go into the washroom with him. What simply needs to happen is that someone bigger and tougher, like the FTC for example, needs to take him down. Or his shareholders at Tesla for example need to rise up and oust him as CEO. Or Twitter needs to crash and burn on his watch which would make look like a bigger loser than he already is. Because by the time that Elon is all but encouraging his followers to go after those he doesn’t like, you know that he’s someone that needs to held accountable for his behaviour. And the sooner that happens, the better.

Elon Musk Mocks Twitter Employee While He Faces A FTC Probe

Posted in Commentary with tags on March 8, 2023 by itnerd

Elon Musk is a total dirtbag. He mocked an ex-employee on Twitter, and it was savage:

Haraldur Thorleifsson, who until recently was employed at Twitter, logged in to his computer last Sunday to do some work — only to find himself locked out, along with 200 others.

He might have figured, as others before him have in the chaotic months of layoffs and firings since Elon Musk took over the company, that he was out of a job. 

Instead, after nine days of no answer from Twitter as to whether or not he was still employed, Thorleifsson decided to tweet at Musk to see if he could catch the billionaire’s attention and get an answer to his Schrödinger’s job situation. 

“Maybe if enough people retweet you’ll answer me here?” he wrote on Monday.

Eventually, he got his answer after a surreal Twitter exchange with Musk, who proceeded to quiz him about his work, question his disability and need for accommodations (Thorleifsson, who goes by “Halli,” has muscular dystrophy and uses a wheelchair) and tweet that Thorleifsson has a “prominent, active Twitter account and is wealthy” and the “reason he confronted me in public was to get a big payout.” While the exchange was going on, Thorleifsson said he received an email that he was no longer employed.

Like I said Elon is a total dirtbag. Something that someone who he clearly listens to must have told him because this happened:

“I would like to apologize to Halli for my misunderstanding of his situation. It was based on things I was told that were untrue or, in some cases, true, but not meaningful,” he tweeted. “He is considering remaining at Twitter.”

Sure. Elon decided to take shots at a differently abled person in public and looked like the dirtbag that he is. Then he had to clean it up when the blowback became too much for him to deal with. Because like I said earlier, he’s a total dirtbag. But strangely, this isn’t his biggest problem. This is:

The Federal Trade Commission is stepping up its investigation into some of Twitter’s most controversial decisions since Elon Musk took over the company last fall. That includes the company’s mass layoffs and the launch of Twitter Blue, as well as the company’s dealings with journalists involved with the so-called “Twitter Files,” according to a new report in The Wall Street Journal.

At issue, is Twitter’s 2022 settlement with the FTC over its use of “deceptive” ad targeting. Along with a $150 million fine, the company at the time agreed to a “comprehensive privacy and information security program,” as well as other strict measures meant to protect users’ privacy. But there’s been widespread concern from lawmakers and others that Twitter has not adhered to those requirements under Musk’s leadership.

Now, The Wall Street Journal reports that the FTC has sent at least a dozen letters to Twitter since last fall in an effort to get more information about the company’s handling of layoffs, Twitter Blue, the “Twitter Files” and other issues. The agency is also reportedly trying to depose Musk as part of the inquiry. The House Judiciary Committee also released a report about the FTC’s inquiries to Twitter.

If the FTC is investigating Twitter, Elon is deep trouble because they’re one of those agencies where if they’re knocking on your door, you’re likely guilty of something. And seeing as they want to depose Elon, I am going to guess that they are pretty sure that they have him dead to rights and want to prove it with him under oath. I’m calling it now, Elon is going do everything he possibly can to avoid being deposed. Because if that does happen, he’s screwed. And not in a good way.

UPDATE: The FTC has confirmed that it is investigating Twitter.

Silverfort introduces five senior appointments

Posted in Commentary with tags on March 8, 2023 by itnerd

Silverfort, the leader in Unified Identity Protection, today introduces five new senior executive team members as it continues to strengthen go-to-market, finance, product, and customer success functions to support strong global growth, following a record year in which the company almost tripled its revenues. The appointments include new leaders as well as internal promotions and underline the company’s dedication to encouraging a diverse workforce, with over 15 female managers hired or promoted into management over the last year, and with women now representing almost 40% of all managerial roles and 50% of the Senior Management Team. 

The new and promoted members of Silverfort’s executive team and their respective positions are as follows:

Michelle Wideman, Chief Customer Officer

Michelle will oversee Silverfort’s Customer Success and Support teams, optimizing the customer journey to help them realize the full value of Unified Identity Protection. More than 20 years’ experience, including Chief Customer Officer roles at companies such as Dell Boomi and Onna, have seen her receive accolades from organizations such as PartnerHacker and Customer Success Collective. She is also a Distinguished Alumna at Elon University. 

Tarah Cammett, Chief Marketing Officer

With 23 years’ technology marketing experience at companies such as Carbon Black and Immersive Labs, Tarah brings brand, demand generation and global sales support together with empathic leadership to drive growth. Based in Silverfort’s Boston office, she was recognized as one of the Top 25 Women Leaders in Cybersecurity in 2021 by The Software Report. 

Irena Meaden, Chief Financial Officer

Newly promoted CFO Irena brings over 20 years in economics, corporate finance, risk, and business management. With previous roles at organizations spanning from Bank of Israel and AIG to fast-growth startups, she is well positioned to help Silverfort steer a sustainable and effective path to growth. 

Revital Aronis, VP of Product Management

Newly promoted VP of Product Management, Revital, will oversee the continual evolution of Silverfort’s Unified Identity Protection platform.  Starting her career at Israel’s elite 8200 Unit, and previously at Illusive Networks, her 15 years’ experience will help the company continually augment the platform to help customers address identity security risks using innovative technology. 

Leslie Bois, VP of Global Channels

A regular fixture on the CRN Channel Chiefs list, Leslie will be responsible for executing and accelerating Silverfort’s global channel strategy. Drawing on experience as Vice President of Global Channels and Alliances at Veracode and Kaspersky Lab, she will be responsible for putting in place a channel-first strategy to help Silverfort scale globally through a balanced ecosystem of partners.

More details on careers at Silverfort can be found on the website.

Two-thirds Of European Firms Adopt A Zero Trust Strategy

Posted in Commentary with tags on March 8, 2023 by itnerd

Over two-thirds of European organizations have begun developing a zero-trust strategy, up from just 25% in 2020, and a further 15% were planning to adopt zero trust tech according to Forrester. The analyst house, which first coined the term over a decade ago, said leading countries adopting zero trust include Germany – 79%, UK – 68%, and France – 66%.

In its new report, Forrester also claimed that public sector organizations are taking a lead with 82% believing their enterprise architecture is invested in and supports zero trust in their organization, compared to 72% of non-governmental organizations. 

All of those adopting zero trust solutions have suffered at least one breach in the past 12 months that impacted key business processes or incurred cyber insurance penalties, the report stated.

Baber Amin, COO of Veridium had this comment:

In the rush to get to zero trust, organizations should not be looking for a quick fix or silver bullet or assume that one product or set of products will to get them zero trust.  Too often, they fail to understand or don’t want to acknowledge that zero trust is a strategy, it is an information security model.  Products can and do help achieve zero trust, but they need to be applied correctly.  The most expensive lock is not secure if the door itself is not properly reinforced. 

Forrester research says, “Zero Trust is an information security model that denies access to applications and data by default.”

Common mistakes when implementing zero trust include:

  • Confusing zero trust strategy with product offerings promising to achieve the desired result. 
  • Zero trust is a philosophy and a journey.  Why? Because zero trust is “Trust nothing, Verify everything, ” requiring  constant vigilance and improvement.
  • Failure to define proper access control policy based on the concept of least privileged access
  • Failing to monitor access creep, and orphan access. 
  • Focusing only on network access and network traffic routing 
  • Failing to implement basic levels of multi factor authentication
  • Not implementing a proper layered security approach that includes basic security hygiene e.g. end point patching, password reuse.
  • Failure to classify and segment data, especially unstructured data
  • Lack of visibility around shadow IT
  • Lack of visibility between IT and OT.  Where there is a gap, it will be exploited.
  • Making your user experience too cumbersome, and adoption an uphill battle

The most important thing security leaders can do is go back to 1st principals. These include:

  • Follow the Least privilege access model
  • Implement a defense in depth model
  • Identify what it means to fail securely (Fail open vs fail close)
  • Minimize the attack surface area
  • Avoid security by obscurity and adopt an open design philosophy
  • Implement a SoD (separation of duty) model
  • Implement the most robust MFA approach your users will adopt

Zero trust is a good idea that organizations should be looking at. If they take the time to properly plan and implement this strategy, it will pay dividends in terms of better securing the environment. Thus this should be required reading for anyone thinking of a zero trust strategy.

INKY Shows How Ring Is Being Used In A Phishing Scam

Posted in Commentary with tags on March 8, 2023 by itnerd

INKY has published a new Fresh Phish article.  In it, INKY uncovers how Phishers posing as home security giant Ring, created a phishing campaign designed to steal credit card information and social security numbers from unwitting customers.

This article details how the phisher used a HTML attachment that created a fake Ring Website of the user’s local machine.

You can read the article here.

HYAS issues POC of BlackMamba AI-based polymorphic malware

Posted in Commentary with tags on March 7, 2023 by itnerd

To illustrate what AI-based malware is capable of, the team at HYAS Labs has just released a proof of concept (PoC) exploiting a large language model to synthesize polymorphic keylogger functionality on-the-fly, dynamically modifying the benign code at runtime — all without any command-and-control infrastructure to deliver or verify the malicious keylogger functionality. The POC and results are published in the HYAS blog post BlackMamba: Using AI to Generate Polymorphic Malware and whitepaper “HYAS Labs Threat Intelligence: BlackMamba AI-Synthesized, Polymorphic Keylogger with On-the-Fly Program Modification.”

To create the POC, HYAS researchers united two seemingly disparate concepts:

a) eliminating the command and control (C2) channel by using malware that could be equipped with intelligent automation and could push-back any attacker-bound data through some benign communication channel, and

b) leveraging AI code generative techniques that could synthesize new malware variants, changing the code such that it can evade detection algorithms.

BlackMamba utilizes a benign executable that reaches out to a high-reputation API (OpenAI) at runtime, so it can return synthesized, malicious code needed to steal an infected user’s keystrokes. It then executes the dynamically generated code within the context of the benign program using Python’s exec() function, with the malicious polymorphic portion remaining totally in-memory. Every time BlackMamba executes, it re-synthesizes its keylogging capability, making the malicious component of this malware truly polymorphic. BlackMamba was tested against an industry leading EDR which will remain nameless, many times, resulting in zero alerts or detections.

Once a device is infected, BlackMamba uses MS Teams. Using its built-in keylogging ability, BlackMamba can collect sensitive information, such as usernames, passwords, credit card numbers, and other personal or confidential data that a user types into their device. Once this data is captured, the malware uses MS Teams webhook to send the collected data to the malicious Teams channel, where it can be analyzed, sold on the dark web, or used for other nefarious purposes.

Delivery uses auto-py-to-exe, an open-source Python package that lets developers convert Python scripts into standalone executable files that can be run on Windows, macOS, and Linux operating systems. As the HYAS blog notes: “The threats posed by this new breed of malware are very real. By eliminating C2 communication and generating new, unique code at runtime, malware like BlackMamba is virtually undetectable by today’s predictive security solutions.”

The HYAS BlackMamba Blog and the full whitepaper are linked here.

UPDATE: I have two comments on this. The first is from Matt Mullins, Senior Security Researcher at Cybrary

   “The BlackMamba sample is very interesting due to its integration of ChatGPT to “prompt hack” as part of its initial payload. The malware sends a prompt to ChatGPT, then using that returned information as part of the python code (the exec function) creates the code, which is then injected and subsequently communicates back via teams webhook. This is a very simple yet very advanced piece of malware because it flies under most detection radars by simply using the same applications that users would (either out of curiosity or by job necessity).

   “The article says that it doesn’t have a C2, but technically it is using teams for the communication so what (in my opinion) would be a better term is the use of high reputation servers for the “C2” comms (Teams and the Microsoft infrastructure). This strategy isn’t entirely new as it has been used before with things like CDNs to bypass filters. Teams has been adopted by a large number of organizations, and also has a couple of issues beyond this that should warrant a serious conversation about its viability as a secure communications channel.

   “The BlackMamba malware is thoughtfully crafted, simple, and elegant. Thus it passes the sniff test of “KISS” or keep-it-simple-stupid when it comes to engineering. The creative use of ChatGPT with the injection code, along with the use of Teams, creates a really great 1-2 punch for bypassing most EDR and detections (human and machine based) as it allows the malware to “swim with the people.” This is a gold-standard for good OpSec, typically.”

Morten Gammelgaard, EMEA, co-founder of BullWall follows up with this: 

   “Truly unnerving. AI controlled Polymorphic malware without the need of command & control. This is a slam dunk – preventative measures will never be able to keep up and therefore will continue to be less and less effective. 

   “This particular approach is one example of how the malware never looks the same (the AI regenerates it on each attack) so defenders cannot establish a model to defend against as they now do with known attack methods. The “keystroke” example here takes a common approach to how credentials are stolen and then used for access and shows how that approach can be made much more effective, ie: bypass defenses.  Not to mention that this approach did not even require a dedicated C2 server that could be tracked.

   “Also, Polymorphic viruses historically rely on mutation engines to alter their decryption routines. If publicly available AI engines enable script kiddies to create these viruses, that’s a real problem.

   “When stealing system specific credentials becomes easy, then access and lateral movement is easy and Bam! they have your data. At that point how they harm you is almost moot. Data theft and ransomware are a popular abuses when that happens. So yeah, easier access is a very big deal.”

Government, Manufacturing, and Healthcare were top targets for cybercriminals in Canada in 2022

Posted in Commentary with tags on March 7, 2023 by itnerd

 Trend Micro today announced a massive 55% increase in overall threat detections in 2022 and a 242% surge in blocked malicious files, as threat actors indiscriminately targeted consumers and organizations across all sectors.

The roundup report reveals several interesting trends for 2022 and beyond:

The top three MITRE ATT&CK techniques show us that threat actors are gaining initial access through remote services, then expanding their footprint within the environment through credential dumping to utilize valid accounts.

An 86% increase in backdoor malware detections reveals threat actors trying to maintain their presence inside networks for a future attack. These backdoors primarily targeted web server platform vulnerabilities.

A record number of Zero Day Initiative (ZDI) advisories (1,706) for the third year in a row is the result of a rapidly expanding corporate attack surface and researcher investment in automated analysis tools, which are finding more bugs. The number of critical vulnerabilities doubled in 2022. Two out of the top three CVEs reported in 2022 were related to Log4j.

The ZDI observed an increase in failed patches and confusing advisories, adding extra time and money to corporate remediation efforts and exposing organizations to unnecessary cyber risk.

Webshells were the top-detected malware of the year, surging 103% on 2021 figures. Emotet detections were second after undergoing something of a resurgence. LockBit and BlackCat were the top ransomware families of 2022.

Ransomware groups rebranded and diversified in a bid to address declining profits. In the future, we expect these groups to move into adjacent areas that monetize initial access, such as stock fraud, business email compromise (BEC), money laundering, and cryptocurrency theft.

Trend Micro recommends that organizations adopt a platform-based approach to managing the cyber-attack surface, mitigate security skills shortages and coverage gaps, and minimize the costs associated with point solutions. This should cover the following:

  • Asset management. Examine assets and determine their criticality, any potential vulnerabilities, the level of threat activity, and how much threat intelligence is being gathered from the asset.
  • Cloud security. Ensure that cloud infrastructure is configured with security in mind to prevent attackers from capitalizing on known gaps and vulnerabilities.
  • Proper security protocols. Prioritize updating software as soon as possible to minimize the exploitation of vulnerabilities. Options such as virtual patching can help organizations until vendors provide official security updates.
  • Attack surface visibility. Monitor disparate technologies and networks within the organization, as well as any security system that protects them. It may be difficult to correlate different data points from siloed sources.

To read a full copy of the report, Rethinking Tactics: 2022 Annual Cybersecurity Report, please click here.

It covers endpoints (Android & iOS, IoT, IIoT, PCs, Macs, Linux, servers), email, web and network layers, OT networks, cloud, home networks, vulnerabilities, consumers, businesses, and governments globally.

TELUS introduces the next generation of Optik TV

Posted in Commentary with tags on March 7, 2023 by itnerd

Today, TELUS introduced its next generation of Optik TV, unleashing a revolutionary content experience and simplifying the way customers find, stream and interact with their favourite content. The new Optik TV offers live and on demand TV across all devices, in addition to new features like personalized profiles, universal search, voice remote and access to thousands of apps through the Google Play Store, all in one intuitive digital box, making the entertainment experience for customers easier and better than ever. 

Powered by a sleek TELUS TV Digital Box with Bluetooth voice remote that takes only minutes to set up, the new Optik TV provides customers with an immersive entertainment experience. New features include: 

  • Simplified menu: The simplified menu and home screen provide easy access to live TV, recordings, search and On Demand content on the navigation bar.
  • Personalized profiles: Enjoy a more personalized TV experience where every member of the household can create a unique profile and get a customized home screen showcasing their favourite channels, movies, recent recordings, and the ability to pick up where they left off at any time.
  • Voice remote: Powered by Google Assistant, customers can control their TV and search for shows using the built-in microphone on the TELUS Remote.
  • Universal search: Customers can conveniently search across Live TV, On Demand, and streaming services to discover content faster without switching between apps.
  • Unlimited recordings: Cloud PVR offers customers unlimited recording capacity so they can save as many shows as they want, and watch them from any device at any time, anywhere in Canada through the TELUS TV+ app.
  • Sports Zone: Customers can create a curated home page capturing their favourite events and sports teams to easily navigate to live or upcoming games and current scores with just a single click.

Optik TV provides access to thousands of apps from Google Play, including YouTube, Netflix, and Amazon Prime Video preloaded for easy access. All plans come with the Core TV package which includes up to 36 HD channels, as well as local favourites. Customers can choose a Core+ Premium package which includes one premium streaming service such as Netflix for just $38 per month. For even more content, TELUS offers the Combo packages such as 4 Theme Packs + 1 Premium and 7 Theme Packs + 1 Premium where customers can choose from popular theme packs such as Disney Time, Sportsnet & Beyond, and Blockbusters. To learn more about TELUS Optik TV, visit www.telus.com/optiktv

Rogers Appears To Have Issues…. Serious Issues

Posted in Commentary with tags on March 7, 2023 by itnerd

Canadian telco Rogers isn’t having a good day based on this from Down Detector:

From a combination of my clients calling me and trolling the Internet, I can say that the problems that Rogers seems to be having cover the following areas:

  • Email if you are using a @Rogers.com email account. More on that in a second.
  • Rogers Ignite Internet
  • Cell Phone connectivity

In terms of Rogers email issues, this seems to have been going on for days as evidenced by this thread on Rogers own support forums. Which is confirmed by numerous clients of mine pleading me to help them. The good news, if you want to call it that is that if you go to https://mail.yahoo.com and enter your Rogers email account details there, you can still get your email. But to be frank, this is a workaround and not a solution. Also trying to create App Specific Passwords for Rogers email accounts does not work.

Clearly, Rogers has serious issues at the moment, and customers are not happy based on these examples from Twitter:

With this latest outage combined with what happened last July, any remaining goodwill that Rogers might have had is gone. And Rogers may not only find itself losing customers, but being forced to explain itself to Parliament, again. I’ll be watching this story as this is another situation where Rogers has absolutely crippled the daily existence of Canadians and I will provide updates when the situation warrants.

UPDATE: In terms of the Internet issues that Rogers is having. What seems to be working for some people (including a client of mine) is this:

You can try this and see if it works for you.

UPDATE 3/9: Rogers continues to have issues. I’ve documented them here.