Community Contributions

Whilst we realise that not everyone is an expert on cyber security, we would still like to get everyone involved in the discussion of this pertinent global issue. This blog platform hopes to serve as a place where budding experts in the field alongside professionals are able to share their insights on cyber security. Through this, we hope to engage people of all backgrounds and disciplines in the cyber security discussion and ultimately to promote greater awareness and understanding.

We are looking for students, young professionals, industry experts and anyone genuinely interested in the topic to contribute articles on a regular or ad-hoc basis.

What you will gain in return is access to a network of cybersecurity enthusiasts and experts, exposure, and experience in simplifying complex topics – all very exciting prospects!

If you are interested, please get in touch via [email protected] to see how you can play a role in simplifying cybersecurity for everyone.

DDOS Attack image

The Dyn DDoS: attacking the Internet’s global address system

By Tanzeer Hossein On October 21, 2016, one of the most significantDistributed Denial of Service (DDoS) attacks occurred. The target...
Image of Bangladesh Bank to illustrate the cyber heist in 2016

The Bangladesh Bank Heist

By Tanzeer Hossein The 2016 massive cyberattack on Bangladesh Bank, the central bank of Bangladesh, remains one of the most...
image of imagined Tangerine Telecoms building under cyberattack

The Cyberattack on Tangerine Telecom

By Tanzeer Hossain In February 2024, Tangerine Telecom, a prominent Australian internet and mobile service provider, became the latest victim...
cyberattack_on_hospitals

The Wannacry Incident

By Tanzeer Hossain In May 2017, a ransomware attack known as "WannaCry" caused a worldwide crisis, severely disrupting computer systems...
Image illustrating the difficulty of risk assessment

Asessing cyber risks

By Roddy Risk management is central to cyber security. It is impossible to create a fully secure system (even an...
Equifax breach illustration

The Equifax Breach

By Tanzeer Hossain In September 2017, Equifax, one of the largest credit reporting agencies, fell prey to one of the...
solarWinds 4

The SolarWinds Cyber Attack

by Tanzeer Hossain In December of 2020, the world witnessed one of the most sophisticated cyberattacks in history: the SolarWinds...
warfare-e1503433303867

The Cost of Ignoring Low-Level Risks

By Roddy The British Library’s report on the cyber attack which it suffered in October 2023 contains some insightful points...
Graphic of padlocks, one of them open

Passwords

By Roddy Passwords, pah! Old-fashioned, insecure. Don’t cha just hate ‘em? Well no, they’re OK, especially if handled thoughtfully and...
Tech worker

Active vs. Passive Cyber Security

By Roddy. There is a lot of confusing – or inconsistent - terminology in cyber security (‘Tactics’ in the MITRE...
darkweb

Fundamentals of the dark web

By Angela Okeke-Ramos The internet is formed of multiple layers. Similar to the ocean only a fraction of these layers...
bridge

The value of mutual TLS for API authentication

By Robert Grigoras. The security and privacy of data exchanged between different systems through APIs is of utmost importance. API...
mobile-phone-1917737_1280

3 Ways To Protect Your Privacy On Facebook

By Nick Duley. As technology is becoming an increasing part of our lives. It’s important to protect our privacy and...
undeclared-war

An honest review Of ‘Undeclared War’ On Channel 4

By Robert Grigoras. Introduction The series is set in 2024, The Undeclared War tracks a leading team of analysts buried...
hack-3671982_1280

Teaching your Nanna about Cyber Security

By Eve Ferguson. Most grandparents are now joining the world of smartphones, social media, internet banking and following the global...
silhouettes-81830_1280

Users – The Weakest Link in Business Security Systems?

By Mustafa Obousy. Employees are proposed to be possibly the weakest link in a business in terms of its’ security...
serverless

Is it Safe to use Serverless Applications?

By Bhaskar Deep. Let’s think like this, Storing our data at an unknown place. Is our data secure? can they...
phishing-3390518_1280

So, What’s Phishing?

By Amelia McGuigan (Cyber Security Student). After the fifth text message this week inviting me to click on a suspicious...
magecart1

MageCart attack

By Atul Periwal. What is Magecart? Magecart is the name assigned behind the world's biggest cyber attacks to a multinational...
virtualisation

Elevating security with virtualisation

By Anton Scott. Major operating systems such as Windows, Mac and Linux have never been as secure as some may...
cyber-1654709_1920

Cyber crime against women

By Atul Periwal. Women play a key role in transformative cultural, environmental and social changes essential for sustainable development. Occupying...
side-channel

Side-channel attacks

By Diana Ion. Too many times overlooked by common security measures, side channels can offer attackers new avenues for information gathering...
data-breach

Data breaches: A story that seems to never end

By Farhan Subhan. Throughout our time on planet Earth, there have been major developments in nearly all aspects of life;...
Monitoring

Why having the right toys matters?

By Diana Ion. It is common knowledge in the security community that it is not a question of “IF a...
Androidimage-scaled

Android wallpaper – a medium for malware infection

By Atul Periwal. You might be thinking of how a wallpaper can be a medium of malware? There might be...
scam-3933004_1920

Coronavirus: A cyber threat

By Atul Periwal. The outbreak of coronavirus (Covid-19) has halted the entire world for months and it’s not ended yet....
stockvault-cybersecurity-concept-being-safe-online182438-scaled

Coronavirus: Remember to stay safe online too

By Chloe Wood. It has been 99 days since Boris Johnson announced to the UK that we will be going...
security-265130_1920

Passwords and Paranoia

By Anton Scott. The issue with universal passwords We have all been there, midway through creating a new account for...
anonymous-4165613_1920

The importance of Ethical Hacking

By Shameer Sabar. As technology advances, and organisations incorporate more and more IT systems into their business in order to...
abstract-access-close-up-1089438

Minimising risk in business: the relevance of cybersecurity and data protection

By Ivan Seifert. Despite being a term on everyone’s lips and an increasing wealth of information becoming available online, cybersecurity...
encryption-key

Changing characteristics in private-public cybersecurity cooperation

By Kate Dinnison. 1. Techplomacy First came the creation of a U.S. Government ambassador to the Silicon Valley, then came...
darkweb

Darkweb crack-down spurs digital refugee crisis

  The FBI, DEA and Europol are celebrating the successful take-down of AlphaBay and Hansa, two of the Dark Web’s...
cyberwarfar

Interview with Dr. Tim Stevens, Lecturer in Global Security at King’s College London

By Kate Dinnison. Recently, we chatted with Dr. Tim Stevens, a lecturer in Global Security at King's College London. His...
Ukraine-Hack

Crash Override: Too big to ignore

By Kate Dinnison. Last December, hackers targeted an electric transmission station in Ukraine, causing approximately one-fifth of the city to...
darkmarket

An interview with Misha Glenny, author of ‘DarkMarket: How Hackers Became the New Mafia’

By Kate Dinnison. We recently interviewed Misha Glenny, journalist and author of DarkMarket: How Hackers Became the New Mafia. His 2011...
Bitcoin

Bitcoin: the risks and how to stay safe using it?

By Melissa Liow. Developed in 2009 by an unknown individual or group under the pseudonym Satoshi Nakamoto, Bitcoin was the...
ransomware-1.0

Protecting yourself against Ransomware

By Joel Chang. If you've watched the news lately you will see ransomware, ransomware, ransomware all over the place. Some of...
Summer-reading

Four recommended Cyber Security Summer reads

We’ve selected some celebrated books in the world of cyber security you should check out this Summer to expand your...
ransomware-e1495985207424

Your PC taken hostage

By Aqsa Hussain. We recently witnessed a cyber attack which left individuals and organisations virtually crippled. The WannaCry ransomware cyber-attack hit...
Cyber-Hygiene

Personal Cyber Hygiene

by Kate Dinnison The Office for National Statistics estimates that there were 2.46 million cyber incidents and 2.11 million victims...
Encryption-Debate-e1494014240629

Decrypting the encryption debate.

by Kate Dinnison Encryption is essentially the process of turning information into code that prevents snoops, criminals, and spies from...
IoT-e1494013571719

Risk in the Internet of Things

By Oliver Yule-Smith. Much of the current excitement on the Internet of Things (IoT) revolves around a focus on how...
Estonia_Cyber-Security-e1490733919753

Estonia: how the country became ‘poster child’ for national cyber security.

By Aqsa Hussain Estonia is considered one of the world’s most digitally advanced societies. Much of the country’s state and...
shutterstock_308703875-1

Who watches the watcher?

By Aqsa Hussain.. We have all heard about the whistleblowing scandal of 2013 which erupted in the USA resulting in...
shutterstock_304814330-e1479938890473

Hipster counter-espionage?

By Philip Smedegaard It is now three years ago that the Russian Federal Protection Service (FSO) (in charge of protecting...

IOT – progress or cyber madness?

I was on the underground (train) recently, staring at the myriad of adverts that adorn the carriages. Amongst the adverts...
shutterstock_164458049-e1478984364710

Hear no evil, see no evil – cyber awareness

  What you don't know can't hurt right? Wrong! The issue with most organisations is that they are waiting for...
shutterstock_235677985-e1478983358134

Phishing and the cost of your information

By Aqsa Hussain. Do you remember receiving that email some time ago mentioning ‘Here is an invoice to the flight...
shutterstock_152337485-e1478982037501

Ethical Hacking vs Hacktivism: where perspective matters.

By Aqsa Hussain. What is ethical hacking? There are codes of conduct for almost every industry, from the rules of...
Graphic of padlocks, one of them open

Distorted risk perception: Why we fear terrorism, but don’t worry about our cyber security.

By Ivan Seifert. What makes you feel safe? Perhaps locking your apartment door at night. Perhaps not walking alone through...
shutterstock_348905468-e1477771560621

Security fatigue

   By Philip Smedegaard "Please update your password settings. Please enter a new password that does not include your birthday. Password...
Trusted-Security

Trusted security

How do you know that you are your mother's child? How can you be sure that the chef in that...
credit-card-1591492_1280

Secrets (and lies)

Phase 3  - The execution Somewhere in a call centre…. Call centre operative: Hello, helpdesk, how can I be of assistance?...
coffee

The rest room is cleaner than my security

Logging and Monitoring The other day, I was in a rest room (a public bathroom in UK-speak) in a fast-food...
bear

Stuff Happens : Managing the Impact of Cyber Security Incidents.

If the past 12 to 18 months have taught us anything, it is that there is a certain inevitability associated...