Teaching your Nanna about Cyber Security

By Eve Ferguson. Most grandparents are now joining the world of smartphones, social media, internet banking and following the global pandemic, online shopping. So, how do you explain to a trusting generation that some people on the internet are just plain evil? My Nan, who is quite tech savvy – probably more tech savvy than…

Read More

Users – The Weakest Link in Business Security Systems?

By Mustafa Obousy. Employees are proposed to be possibly the weakest link in a business in terms of its’ security system, as they are most liable to hacking schemes – as they are usually targeted through emails and attachments which could potentially bring down the reputation of a business eventually leading to organisation failure. A…

Read More

Is it Safe to use Serverless Applications?

By Bhaskar Deep. Let’s think like this, Storing our data at an unknown place. Is our data secure? can they access our business data? And the question chain continues… Who is using it them?   Modern technologies play a crucial role in the challenging IT world, many companies like Netflix and Adobe started using serverless applications.…

Read More

So, What’s Phishing?

By Amelia McGuigan (Cyber Security Student). After the fifth text message this week inviting me to click on a suspicious link, I decided to dig a little deeper into how to avoid phishing attacks. We are continuously warned not to click on mysterious links in emails and texts, yet it only takes a momentary lapse…

Read More

MageCart attack

By Atul Periwal. What is Magecart? Magecart is the name assigned behind the world’s biggest cyber attacks to a multinational consortium of at least 8 criminal organizations. They’re best known as Magecart attacks, also known in the tech landscape as front-end attacks. These hacker groups who attack shopping cart networks online, typically the Magento scheme,…

Read More

Elevating security with virtualisation

By Anton Scott. Major operating systems such as Windows, Mac and Linux have never been as secure as some may believe them to be. As with any system, the main point of vulnerability is often the user; opening the wrong link/attachment, vising the wrong site, and installing suspicious software can open the floodgates for malware.…

Read More

Cyber crime against women

By Atul Periwal. Women play a key role in transformative cultural, environmental and social changes essential for sustainable development. Occupying a critical function, any mistreatment or subjugation of her reputation was seen as disrespectful, not just to her but to society as a whole. Yet the same doesn’t seem to be the case a few…

Read More

Side-channel attacks

By Diana Ion. Too many times overlooked by common security measures, side channels can offer attackers new avenues for information gathering and possibly much more.  A simple definition of a side-channel is something that enables you to find out something about a thing without directly observing that thing.    Think of a quiet neighborhood during wintertime.  All roofs are covered by snow, except for one.…

Read More

Data breaches: A story that seems to never end

By Farhan Subhan. Throughout our time on planet Earth, there have been major developments in nearly all aspects of life; from the industrial revolution to the events revolving around Y2K. Even with the doubts of the year 2000, and how calendar storage data was going to be affected due to the transition into the new…

Read More

Why having the right toys matters?

By Diana Ion. It is common knowledge in the security community that it is not a question of “IF a system fails” but more of “WHEN a system fails”. Having 100% coverage against attacks is impossible since your controls can never fail while an attacker needs only one lucky strike to succeed. Always aiming for…

Read More

Android wallpaper – a medium for malware infection

By Atul Periwal. You might be thinking of how a wallpaper can be a medium of malware? There might be an error but no, a wallpaper on android phone can be used as a medium of malware to crash your android mobile phone. The image above, which can be directly downloaded from Google images, causes…

Read More

Coronavirus: A cyber threat

By Atul Periwal. The outbreak of coronavirus (Covid-19) has halted the entire world for months and it’s not ended yet. In this pandemic as the figure of infected people is rising due to a virus, simultaneously cybercrime threats are increasing at a rapid rate. It is pointless to mention, there are thousands of examples showing…

Read More