![Tangerine cyberattack image of imagined Tangerine Telecoms building under cyberattack](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/Tangerine-cyberattackl-e1721158534116-landscape.webp)
The Cyberattack on Tangerine Telecom
By Tanzeer Hossain In February 2024, Tangerine Telecom, a prominent Australian internet and mobile service provider, became the latest victim...
![cyberattack_on_hospitals cyberattack_on_hospitals](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/cyberattack_on_hospitals-landscape.png)
The Wannacry Incident
By Tanzeer Hossain In May 2017, a ransomware attack known as "WannaCry" caused a worldwide crisis, severely disrupting computer systems...
![Equifax breach illustration Equifax breach illustration](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/Equifax-breach-illustration-landscape.png)
The Equifax Breach
By Tanzeer Hossain In September 2017, Equifax, one of the largest credit reporting agencies, fell prey to one of the...
![warfare-e1503433303867 warfare-e1503433303867](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/warfare-e1713529100151-landscape.jpg)
The Cost of Ignoring Low-Level Risks
By Roddy The British Library’s report on the cyber attack which it suffered in October 2023 contains some insightful points...
![shutterstock_103173644-e1478109962991 Graphic of padlocks, one of them open](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/shutterstock_103173644-e1478109962991-landscape.jpg)
Passwords
By Roddy Passwords, pah! Old-fashioned, insecure. Don’t cha just hate ‘em? Well no, they’re OK, especially if handled thoughtfully and...
![Summer-reading Summer-reading](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/Summer-reading-1024x1024-landscape.jpg)
Four recommended Cyber Security Summer reads
We’ve selected some celebrated books in the world of cyber security you should check out this Summer to expand your...
![IoT-e1494013571719 IoT-e1494013571719](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/IoT-e1494013571719-landscape.jpg)
Risk in the Internet of Things
By Oliver Yule-Smith. Much of the current excitement on the Internet of Things (IoT) revolves around a focus on how...
![Estonia_Cyber-Security-e1490733919753 Estonia_Cyber-Security-e1490733919753](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/Estonia_Cyber-Security-e1490733919753-landscape.jpg)
Estonia: how the country became ‘poster child’ for national cyber security.
By Aqsa Hussain Estonia is considered one of the world’s most digitally advanced societies. Much of the country’s state and...
![shutterstock_164458049-e1478984364710 shutterstock_164458049-e1478984364710](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/shutterstock_164458049-e1478984364710-landscape.jpg)
Hear no evil, see no evil – cyber awareness
What you don't know can't hurt right? Wrong! The issue with most organisations is that they are waiting for...