Teaching your Nanna about Cyber Security
By Eve Ferguson. Most grandparents are now joining the world of smartphones, social media, internet banking and following the global...
Users – The Weakest Link in Business Security Systems?
By Mustafa Obousy. Employees are proposed to be possibly the weakest link in a business in terms of its’ security...
So, What’s Phishing?
By Amelia McGuigan (Cyber Security Student). After the fifth text message this week inviting me to click on a suspicious...
MageCart attack
By Atul Periwal. What is Magecart? Magecart is the name assigned behind the world's biggest cyber attacks to a multinational...
Cyber crime against women
By Atul Periwal. Women play a key role in transformative cultural, environmental and social changes essential for sustainable development. Occupying...
Data breaches: A story that seems to never end
By Farhan Subhan. Throughout our time on planet Earth, there have been major developments in nearly all aspects of life;...
Coronavirus: A cyber threat
By Atul Periwal. The outbreak of coronavirus (Covid-19) has halted the entire world for months and it’s not ended yet....
Changing characteristics in private-public cybersecurity cooperation
By Kate Dinnison. 1. Techplomacy First came the creation of a U.S. Government ambassador to the Silicon Valley, then came...
Darkweb crack-down spurs digital refugee crisis
The FBI, DEA and Europol are celebrating the successful take-down of AlphaBay and Hansa, two of the Dark Web’s...
An interview with Misha Glenny, author of ‘DarkMarket: How Hackers Became the New Mafia’
By Kate Dinnison. We recently interviewed Misha Glenny, journalist and author of DarkMarket: How Hackers Became the New Mafia. His 2011...