
The Dyn DDoS: attacking the Internet’s global address system
By Tanzeer Hossein On October 21, 2016, one of the most significantDistributed Denial of Service (DDoS) attacks occurred. The target...

The Bangladesh Bank Heist
By Tanzeer Hossein The 2016 massive cyberattack on Bangladesh Bank, the central bank of Bangladesh, remains one of the most...

The Cyberattack on Tangerine Telecom
By Tanzeer Hossain In February 2024, Tangerine Telecom, a prominent Australian internet and mobile service provider, became the latest victim...

The Wannacry Incident
By Tanzeer Hossain In May 2017, a ransomware attack known as "WannaCry" caused a worldwide crisis, severely disrupting computer systems...

The Equifax Breach
By Tanzeer Hossain In September 2017, Equifax, one of the largest credit reporting agencies, fell prey to one of the...

The Cost of Ignoring Low-Level Risks
By Roddy The British Library’s report on the cyber attack which it suffered in October 2023 contains some insightful points...

Passwords
By Roddy Passwords, pah! Old-fashioned, insecure. Don’t cha just hate ‘em? Well no, they’re OK, especially if handled thoughtfully and...

Four recommended Cyber Security Summer reads
We’ve selected some celebrated books in the world of cyber security you should check out this Summer to expand your...

Risk in the Internet of Things
By Oliver Yule-Smith. Much of the current excitement on the Internet of Things (IoT) revolves around a focus on how...

Estonia: how the country became ‘poster child’ for national cyber security.
By Aqsa Hussain Estonia is considered one of the world’s most digitally advanced societies. Much of the country’s state and...