Cybercrime

Image of Bangladesh Bank to illustrate the cyber heist in 2016

The Bangladesh Bank Heist

By Tanzeer Hossein The 2016 massive cyberattack on Bangladesh Bank, the central bank of Bangladesh, remains one of the most...
Digital binary code with three red crosses on a gray and green background.

The Wannacry Incident

By Tanzeer Hossain In May 2017, a ransomware attack known as "WannaCry" caused a worldwide crisis, severely disrupting computer systems...
A hooded figure running over digital data stacks, symbolizing cybercrime.

The Equifax Breach

By Tanzeer Hossain In September 2017, Equifax, one of the largest credit reporting agencies, fell prey to one of the...
A thief sneaking away with a credit card from a laptop.

Teaching your Nanna about Cyber Security

By Eve Ferguson. Most grandparents are now joining the world of smartphones, social media, internet banking and following the global...
Silhouetted businesspeople connected in a hierarchical network chart.

Users – The Weakest Link in Business Security Systems?

By Mustafa Obousy. Employees are proposed to be possibly the weakest link in a business in terms of its’ security...
Silhouette with fishing rod targeting a man's laptop, symbolizing phishing.

So, What’s Phishing?

By Amelia McGuigan (Cyber Security Student). After the fifth text message this week inviting me to click on a suspicious...
A person coding on a laptop with visible programming code on the screen.

MageCart attack

By Atul Periwal. What is Magecart? Magecart is the name assigned behind the world's biggest cyber attacks to a multinational...
A hand silhouette against a digital binary code background.

Cyber crime against women

By Atul Periwal. Women play a key role in transformative cultural, environmental and social changes essential for sustainable development. Occupying...
Word cloud highlighting key terms related to cybersecurity.

Data breaches: A story that seems to never end

By Farhan Subhan. Throughout our time on planet Earth, there have been major developments in nearly all aspects of life;...
A hand emerges from a laptop, grabbing money, symbolizing cyber theft.

Coronavirus: A cyber threat

By Atul Periwal. The outbreak of coronavirus (Covid-19) has halted the entire world for months and it’s not ended yet....
Digital blue and green arrows formed from circuit patterns.

Changing characteristics in private-public cybersecurity cooperation

By Kate Dinnison. 1. Techplomacy First came the creation of a U.S. Government ambassador to the Silicon Valley, then came...
Laptop screen displaying the text 'Dark Web' in red letters on a black background.

Darkweb crack-down spurs digital refugee crisis

  The FBI, DEA and Europol are celebrating the successful take-down of AlphaBay and Hansa, two of the Dark Web’s...