![darkweb darkweb](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/darkweb-1024x512-landscape.jpg)
Fundamentals of the dark web
By Angela Okeke-Ramos The internet is formed of multiple layers. Similar to the ocean only a fraction of these layers...
![hack-3671982_1280 hack-3671982_1280](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/hack-3671982_1280-1024x685-landscape.jpg)
Teaching your Nanna about Cyber Security
By Eve Ferguson. Most grandparents are now joining the world of smartphones, social media, internet banking and following the global...
![silhouettes-81830_1280 silhouettes-81830_1280](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/silhouettes-81830_1280-1024x723-landscape.jpg)
Users – The Weakest Link in Business Security Systems?
By Mustafa Obousy. Employees are proposed to be possibly the weakest link in a business in terms of its’ security...
![serverless serverless](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/serverless-1024x576-landscape.jpg)
Is it Safe to use Serverless Applications?
By Bhaskar Deep. Let’s think like this, Storing our data at an unknown place. Is our data secure? can they...
![phishing-3390518_1280 phishing-3390518_1280](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/phishing-3390518_1280-1024x666-landscape.jpg)
So, What’s Phishing?
By Amelia McGuigan (Cyber Security Student). After the fifth text message this week inviting me to click on a suspicious...
![magecart1 magecart1](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/magecart1-1024x523-landscape.jpg)
MageCart attack
By Atul Periwal. What is Magecart? Magecart is the name assigned behind the world's biggest cyber attacks to a multinational...
![virtualisation virtualisation](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/virtualisation-1024x702-landscape.jpg)
Elevating security with virtualisation
By Anton Scott. Major operating systems such as Windows, Mac and Linux have never been as secure as some may...
![cyber-1654709_1920 cyber-1654709_1920](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/cyber-1654709_1920-1024x683-landscape.jpg)
Cyber crime against women
By Atul Periwal. Women play a key role in transformative cultural, environmental and social changes essential for sustainable development. Occupying...
![side-channel side-channel](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/side-channel-1024x682-landscape.jpg)
Side-channel attacks
By Diana Ion. Too many times overlooked by common security measures, side channels can offer attackers new avenues for information gathering...
![data-breach data-breach](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/data-breach-1024x744-landscape.jpg)
Data breaches: A story that seems to never end
By Farhan Subhan. Throughout our time on planet Earth, there have been major developments in nearly all aspects of life;...