![hack-3671982_1280 hack-3671982_1280](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/hack-3671982_1280-1024x685-landscape.jpg)
Teaching your Nanna about Cyber Security
By Eve Ferguson. Most grandparents are now joining the world of smartphones, social media, internet banking and following the global...
![silhouettes-81830_1280 silhouettes-81830_1280](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/silhouettes-81830_1280-1024x723-landscape.jpg)
Users – The Weakest Link in Business Security Systems?
By Mustafa Obousy. Employees are proposed to be possibly the weakest link in a business in terms of its’ security...
![cyber-1654709_1920 cyber-1654709_1920](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/cyber-1654709_1920-1024x683-landscape.jpg)
Cyber crime against women
By Atul Periwal. Women play a key role in transformative cultural, environmental and social changes essential for sustainable development. Occupying...
![Androidimage-scaled Androidimage-scaled](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/Androidimage-scaled-1-1024x513-landscape.jpg)
Android wallpaper – a medium for malware infection
By Atul Periwal. You might be thinking of how a wallpaper can be a medium of malware? There might be...