![cyberattack_on_hospitals cyberattack_on_hospitals](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/cyberattack_on_hospitals-landscape.png)
The Wannacry Incident
By Tanzeer Hossain In May 2017, a ransomware attack known as "WannaCry" caused a worldwide crisis, severely disrupting computer systems...
![Equifax breach illustration Equifax breach illustration](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/Equifax-breach-illustration-landscape.png)
The Equifax Breach
By Tanzeer Hossain In September 2017, Equifax, one of the largest credit reporting agencies, fell prey to one of the...
![hack-3671982_1280 hack-3671982_1280](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/hack-3671982_1280-1024x685-landscape.jpg)
Teaching your Nanna about Cyber Security
By Eve Ferguson. Most grandparents are now joining the world of smartphones, social media, internet banking and following the global...
![silhouettes-81830_1280 silhouettes-81830_1280](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/silhouettes-81830_1280-1024x723-landscape.jpg)
Users – The Weakest Link in Business Security Systems?
By Mustafa Obousy. Employees are proposed to be possibly the weakest link in a business in terms of its’ security...
![phishing-3390518_1280 phishing-3390518_1280](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/phishing-3390518_1280-1024x666-landscape.jpg)
So, What’s Phishing?
By Amelia McGuigan (Cyber Security Student). After the fifth text message this week inviting me to click on a suspicious...
![magecart1 magecart1](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/magecart1-1024x523-landscape.jpg)
MageCart attack
By Atul Periwal. What is Magecart? Magecart is the name assigned behind the world's biggest cyber attacks to a multinational...
![cyber-1654709_1920 cyber-1654709_1920](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/cyber-1654709_1920-1024x683-landscape.jpg)
Cyber crime against women
By Atul Periwal. Women play a key role in transformative cultural, environmental and social changes essential for sustainable development. Occupying...
![data-breach data-breach](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/data-breach-1024x744-landscape.jpg)
Data breaches: A story that seems to never end
By Farhan Subhan. Throughout our time on planet Earth, there have been major developments in nearly all aspects of life;...
![scam-3933004_1920 scam-3933004_1920](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/scam-3933004_1920-1024x594-landscape.jpg)
Coronavirus: A cyber threat
By Atul Periwal. The outbreak of coronavirus (Covid-19) has halted the entire world for months and it’s not ended yet....
![encryption-key encryption-key](https://demystifysecurity.com/wp-content/uploads/bb-plugin/cache/encryption-key-landscape.jpg)
Changing characteristics in private-public cybersecurity cooperation
By Kate Dinnison. 1. Techplomacy First came the creation of a U.S. Government ambassador to the Silicon Valley, then came...