![Tangerine cyberattack image of imagined Tangerine Telecoms building under cyberattack](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/Tangerine-cyberattackl-e1721158534116-landscape.webp)
The Cyberattack on Tangerine Telecom
By Tanzeer Hossain In February 2024, Tangerine Telecom, a prominent Australian internet and mobile service provider, became the latest victim...
![shutterstock_103173644-e1478109962991 Graphic of padlocks, one of them open](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/shutterstock_103173644-e1478109962991-landscape.jpg)
Passwords
By Roddy Passwords, pah! Old-fashioned, insecure. Don’t cha just hate ‘em? Well no, they’re OK, especially if handled thoughtfully and...
![bridge bridge](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/bridge-1024x683-landscape.jpg)
The value of mutual TLS for API authentication
By Robert Grigoras. The security and privacy of data exchanged between different systems through APIs is of utmost importance. API...
![security-265130_1920 security-265130_1920](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/security-265130_1920-1024x683-landscape.jpg)
Passwords and Paranoia
By Anton Scott. The issue with universal passwords We have all been there, midway through creating a new account for...
![anonymous-4165613_1920 anonymous-4165613_1920](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/anonymous-4165613_1920-1024x654-landscape.jpg)
The importance of Ethical Hacking
By Shameer Sabar. As technology advances, and organisations incorporate more and more IT systems into their business in order to...