Community Contribution

Laptop screen displaying the text 'Dark Web' in red letters on a black background.

Fundamentals of the dark web

By Angela Okeke-Ramos The internet is formed of multiple layers. Similar to the ocean only a fraction of these layers...
A thief sneaking away with a credit card from a laptop.

Teaching your Nanna about Cyber Security

By Eve Ferguson. Most grandparents are now joining the world of smartphones, social media, internet banking and following the global...
Silhouetted businesspeople connected in a hierarchical network chart.

Users – The Weakest Link in Business Security Systems?

By Mustafa Obousy. Employees are proposed to be possibly the weakest link in a business in terms of its’ security...
Dimly lit data center aisle with server racks and digital icons floating.

Is it Safe to use Serverless Applications?

By Bhaskar Deep. Let’s think like this, Storing our data at an unknown place. Is our data secure? can they...
Silhouette with fishing rod targeting a man's laptop, symbolizing phishing.

So, What’s Phishing?

By Amelia McGuigan (Cyber Security Student). After the fifth text message this week inviting me to click on a suspicious...
A person coding on a laptop with visible programming code on the screen.

MageCart attack

By Atul Periwal. What is Magecart? Magecart is the name assigned behind the world's biggest cyber attacks to a multinational...
Abstract blue digital circles with futuristic technology design.

Elevating security with virtualisation

By Anton Scott. Major operating systems such as Windows, Mac and Linux have never been as secure as some may...
A hand silhouette against a digital binary code background.

Cyber crime against women

By Atul Periwal. Women play a key role in transformative cultural, environmental and social changes essential for sustainable development. Occupying...
Stream of digital code projected in a futuristic style.

Side-channel attacks

By Diana Ion. Too many times overlooked by common security measures, side channels can offer attackers new avenues for information gathering...
Word cloud highlighting key terms related to cybersecurity.

Data breaches: A story that seems to never end

By Farhan Subhan. Throughout our time on planet Earth, there have been major developments in nearly all aspects of life;...
Magnifying glass over digital binary code, symbolizing data analysis.

Why having the right toys matters?

By Diana Ion. It is common knowledge in the security community that it is not a question of “IF a...
A smartphone displaying a scenic sunset over mountains and a lake.

Android wallpaper – a medium for malware infection

By Atul Periwal. You might be thinking of how a wallpaper can be a medium of malware? There might be...