Cyber Security

Luke Hally

Blog

Join me as I undertake my Masters of Cyber Security

Latest Posts

Cyber ethics

The Equifax breach

Equifax is one of the world’s largest credit reporting agencies (CRA), creating credit reports from consumer data which is sold to third parties. Being high

Read More »
Data security & privacy

Privacy

Looking in more detail at privacy this week. I encountered privacy in my first course, Foundations of Cyber Security. It had a profound impact on

Read More »
Data security & privacy

Asymmetric Warfare

Symmetry and asymmetry is something we see a lot of in cyber security. We break symmetry with passwords and authentication – making it easy for

Read More »
Security engineering

Social engineering hack

“ Social engineering is an extremely effective technique used by hackers worldwide to compromise internal systems and proprietary information assets. In fact, it’s one of

Read More »
Cybersecurity foundations

Shift Security Left

Shifting Security Left is a paradigm that encourages a proactive, rather than reactive – approach to security. The term is in reference to the software

Read More »
Cybersecurity foundations

Zero Click Hack Exposed

An interesting and concerning security in the news this week. It has been alleged that Israelli Cyber Surveillance Company, NSO’s software has been used by

Read More »
Cybersecurity foundations

Identity Theft

Identity theft is a major problem. It occurs when criminals collect enough of your personal information to convince people that they are you. What sort

Read More »
Cybersecurity foundations

Website trackers

Data hungry website We all know that websites are tracking us all of the time, as I mentioned the data tracking economy when I explored

Read More »