Privacy is the right of an individual or a group of individuals to choose when,…

A Cybersecurity Case Study – Ebay suffers a massive security breach in May 2014
More than 4,100 publicly disclosed data breaches occurred in 2022 equating to approximately 22…

Cyberattacks, Disaster Recovery & Business Continuity – Nine Entertainment as Case Study
Case Study 1: Analysis of a Real-World Incident – Nine Entertainment Cyberattack “Australia’s Channel Nine…

Security Best Practices for your Android Devices
How certain are you that the message you sent five minutes ago via one of your social media handle was not read by someone else other than the intended recipient?

Protecting your Personal Devices from Cyber Attacks
No one wants to imagine, talk less of experiencing that moment where by you cannot access an app as usual on your mobile phone…

Solving Problems with Critical and Creative Thinking
When the road comes to an end, change direction and you will pass through. –…

Two-Hour Road Trip
“We are going for a wild ride guys, so fasten your belts”. Just as the…

Pizza Cooking Party
As they got out of the car, Sam alongside Freddie, Jane and ofcourse, Sherry who…

The Rival
With her third miscarriage in two years, the line of hope Lena is holding to…

Contract Gone Sour
The door opened with a screeching sound as Ralph walked into room with his attorney,…