Teaching your Nanna about Cyber Security

A thief sneaking away with a credit card from a laptop.

By Eve Ferguson. Most grandparents are now joining the world of smartphones, social media, internet banking and following the global pandemic, online shopping. So, how do you explain to a trusting generation that some people on the internet are just plain evil? My Nan, who is quite tech savvy – probably more tech savvy than…

Read More

Users – The Weakest Link in Business Security Systems?

Silhouetted businesspeople connected in a hierarchical network chart.

By Mustafa Obousy. Employees are proposed to be possibly the weakest link in a business in terms of its’ security system, as they are most liable to hacking schemes – as they are usually targeted through emails and attachments which could potentially bring down the reputation of a business eventually leading to organisation failure. A…

Read More

Is it Safe to use Serverless Applications?

Dimly lit data center aisle with server racks and digital icons floating.

By Bhaskar Deep. Let’s think like this, Storing our data at an unknown place. Is our data secure? can they access our business data? And the question chain continues… Who is using it them?   Modern technologies play a crucial role in the challenging IT world, many companies like Netflix and Adobe started using serverless applications.…

Read More

So, What’s Phishing?

Silhouette with fishing rod targeting a man's laptop, symbolizing phishing.

By Amelia McGuigan (Cyber Security Student). After the fifth text message this week inviting me to click on a suspicious link, I decided to dig a little deeper into how to avoid phishing attacks. We are continuously warned not to click on mysterious links in emails and texts, yet it only takes a momentary lapse…

Read More

MageCart attack

A person coding on a laptop with visible programming code on the screen.

By Atul Periwal. What is Magecart? Magecart is the name assigned behind the world’s biggest cyber attacks to a multinational consortium of at least 8 criminal organizations. They’re best known as Magecart attacks, also known in the tech landscape as front-end attacks. These hacker groups who attack shopping cart networks online, typically the Magento scheme,…

Read More

Elevating security with virtualisation

Abstract blue digital circles with futuristic technology design.

By Anton Scott. Major operating systems such as Windows, Mac and Linux have never been as secure as some may believe them to be. As with any system, the main point of vulnerability is often the user; opening the wrong link/attachment, vising the wrong site, and installing suspicious software can open the floodgates for malware.…

Read More

Cyber crime against women

A hand silhouette against a digital binary code background.

By Atul Periwal. Women play a key role in transformative cultural, environmental and social changes essential for sustainable development. Occupying a critical function, any mistreatment or subjugation of her reputation was seen as disrespectful, not just to her but to society as a whole. Yet the same doesn’t seem to be the case a few…

Read More

Side-channel attacks

Stream of digital code projected in a futuristic style.

By Diana Ion. Too many times overlooked by common security measures, side channels can offer attackers new avenues for information gathering and possibly much more.  A simple definition of a side-channel is something that enables you to find out something about a thing without directly observing that thing.    Think of a quiet neighborhood during wintertime.  All roofs are covered by snow, except for one.…

Read More

Data breaches: A story that seems to never end

Word cloud highlighting key terms related to cybersecurity.

By Farhan Subhan. Throughout our time on planet Earth, there have been major developments in nearly all aspects of life; from the industrial revolution to the events revolving around Y2K. Even with the doubts of the year 2000, and how calendar storage data was going to be affected due to the transition into the new…

Read More

Why having the right toys matters?

Magnifying glass over digital binary code, symbolizing data analysis.

By Diana Ion. It is common knowledge in the security community that it is not a question of “IF a system fails” but more of “WHEN a system fails”. Having 100% coverage against attacks is impossible since your controls can never fail while an attacker needs only one lucky strike to succeed. Always aiming for…

Read More

Android wallpaper – a medium for malware infection

A smartphone displaying a scenic sunset over mountains and a lake.

By Atul Periwal. You might be thinking of how a wallpaper can be a medium of malware? There might be an error but no, a wallpaper on android phone can be used as a medium of malware to crash your android mobile phone. The image above, which can be directly downloaded from Google images, causes…

Read More

Coronavirus: A cyber threat

A hand emerges from a laptop, grabbing money, symbolizing cyber theft.

By Atul Periwal. The outbreak of coronavirus (Covid-19) has halted the entire world for months and it’s not ended yet. In this pandemic as the figure of infected people is rising due to a virus, simultaneously cybercrime threats are increasing at a rapid rate. It is pointless to mention, there are thousands of examples showing…

Read More