Cyber attack

A futuristic data center with glowing servers under a dramatic red cloud formation.

The Dyn DDoS: attacking the Internet’s global address system

By Tanzeer Hossein On October 21, 2016, one of the most significantDistributed Denial of Service (DDoS) attacks occurred. The target...
Image of Bangladesh Bank to illustrate the cyber heist in 2016

The Bangladesh Bank Heist

By Tanzeer Hossein The 2016 massive cyberattack on Bangladesh Bank, the central bank of Bangladesh, remains one of the most...
image of imagined Tangerine Telecoms building under cyberattack

The Cyberattack on Tangerine Telecom

By Tanzeer Hossain In February 2024, Tangerine Telecom, a prominent Australian internet and mobile service provider, became the latest victim...
Digital binary code with three red crosses on a gray and green background.

The Wannacry Incident

By Tanzeer Hossain In May 2017, a ransomware attack known as "WannaCry" caused a worldwide crisis, severely disrupting computer systems...
A hooded figure running over digital data stacks, symbolizing cybercrime.

The Equifax Breach

By Tanzeer Hossain In September 2017, Equifax, one of the largest credit reporting agencies, fell prey to one of the...
A white cartoon bomb with a lit fuse on a blue background.

The Cost of Ignoring Low-Level Risks

By Roddy The British Library’s report on the cyber attack which it suffered in October 2023 contains some insightful points...
Graphic of padlocks, one of them open

Passwords

By Roddy Passwords, pah! Old-fashioned, insecure. Don’t cha just hate ‘em? Well no, they’re OK, especially if handled thoughtfully and...
Person reading a book by the pool on a sunny day.

Four recommended Cyber Security Summer reads

We’ve selected some celebrated books in the world of cyber security you should check out this Summer to expand your...
Hand interacting with cloud computing and cybersecurity icons on transparent interface.

Risk in the Internet of Things

By Oliver Yule-Smith. Much of the current excitement on the Internet of Things (IoT) revolves around a focus on how...
Keyboard key with the Thin Blue Line flag symbol.

Estonia: how the country became ‘poster child’ for national cyber security.

By Aqsa Hussain Estonia is considered one of the world’s most digitally advanced societies. Much of the country’s state and...
Man in suit covering ears with fingers, appearing frustrated.

Hear no evil, see no evil – cyber awareness

  What you don't know can't hurt right? Wrong! The issue with most organisations is that they are waiting for...
A lock pick tool placed on several credit cards.

Secrets (and lies)

Phase 3  - The execution Somewhere in a call centre…. Call centre operative: Hello, helpdesk, how can I be of assistance?...