top of page


Demystifying Peer-to-Peer Networks: A Comprehensive Guide
Peer-to-peer (P2P) networks have revolutionized the way we share and distribute information across the internet. Unlike conventional...
shaun9968
Dec 15, 20234 min read


The Deepfake Dilemma: Unravelling the Web of Disinformation and its Security Implications
In an era dominated by technological advancements and innovation, the rise of deepfakes has ushered in a new wave of challenges,...
shaun9968
Dec 12, 20234 min read


Understanding Supply Chain Attacks
Supply Chain is Big! It is defined as “a network of organizations, people, activities, information, and resources involved in the...
shaun9968
Dec 4, 20233 min read


Title: The Ubiquity and Security Implications of QR Codes
Introduction: Quick Response codes or QR codes as they are more commonly known, have seamlessly integrated into our daily lives,...
emily07590
Dec 3, 20234 min read


End-of-Life Software: A Security Minefield
What is End of life software? In the rapidly evolving landscape of technology, software applications play a crucial role in our daily lives, more so than we often think, every interaction with a computer, smartphone etc involves interaction with some form of software at some point. As useful as software is, like many things it ages, as it does it reaches a point known as "end-of-life" (EOL). As you may or may not know, software is, and always has been, sold in terms of “a lic
shaun9968
Nov 14, 20235 min read


Navigating Technology in the Golden Years: Challenges, Security Concerns, and the Need for Patience
Introduction: The digital age we now find ourselves in has transformed the way we live, work and interact with the world. While...
shaun9968
Nov 8, 20236 min read
Defending Against Social Engineering: Smishing, Vishing and Phishing
In today's world, criminals employ various techniques to manipulate, con, or deceive individuals into disclosing sensitive information or...
shaun9968
Nov 2, 20236 min read


Futureproofing IoT Devices in an Interconnected World
Internet of Things or IoT is most likely a term that you are familiar with or that you have at least heard. It describes a collection of...
shaun9968
Oct 19, 20235 min read
Bluetooth Technology: Connecting the World with Convenience amid Security Challenges
What is Bluetooth? Named after a 10th-century Danish king, King Harald "Bluetooth" Gormsson, who united Denmark and parts of Norway,...
shaun9968
Oct 12, 20237 min read


Title: "Guarding Your Digital Footprint: The Importance of Online Caution
“On the Internet, nobody knows you’re a dog” Ack: "Thanks to American Peter Steiner for the artwork" The above cartoon by Peter Steiner...
shaun9968
Oct 4, 20237 min read
Cyber Security Blogs
bottom of page
