top of page


Cybersecurity Requirements for Remote Operations (6G & Tele-surgery)
Protection of Patients Safety and Data Integrity in Next-Generation Medical Netw Article Written By: Iyithihya Prakasan Article Designed by: Iyithihya Prakasan and Natasha Gumpula With the technological development of remote surgery , a physician can soon remotely control robotic tools with super-speedy networks such as 6G . To ensure this works safely, then we can use good cybersecurity to ensure protection of patients, doctors and the complete system at large. Image from

Iyithihya Prakasan
3 hours ago3 min read


A Comprehensive Analysis of Quantum Computing: Engineering Challenges and Opportunities
Article Written By: Adrian Bermudez Article Designed by: Adrian Bermudez & Sanvi Desai Quantum computing is seen as the imminent revolution in computational science; this comes after the challenges to the foundational paradigms of classical physics and information theory. Quantum computing is promising the ability to tackle problems deemed insurmountable by even the most powerful conventional supercomputers. Unlike classical computers that process bits as either 0 or 1, quan

Adrian Bermudez
Mar 295 min read


Important Cybersecurity Techniques to Know
Article Written By: Lakkshanasre Viyasarramanujam Article Designed by: Natasha Gumpula and Lakkshanasre Viyasarramanujam In the world of intricate security, one thing remains crucial: the power of cryptography. It's the clever work of techniques and methods that ensure that we can keep our systems and exchange of information private from attackers. So if you’re curious about learning how these digital locks work, we will learn about the importance of cryptography and the diff

Lakkshanasre Viyasarramanujam
Mar 263 min read


FUHSD Board Approves Policy Changes
Article Written By: Sanvi Desai & Natasha Gumpula For many students in the Fremont Union High School District (FUHSD), cyberbullying has been something people quietly deal with rather than something schools actively address. That’s what made the FUHSD Board of Trustees meeting on February 10, 2026 feel different. Students showed up, not just in person, but online too, to support a push for stronger aftermath protections. Members of Cyber For Youth and student advocates Sa

Sanvi Desai
Mar 222 min read
Deepfake Texts and Voices: The New Risk to Employers
Article written by: Chintana Bhaskara Article designed by: Chintana Bhaskara & Sanvi Desai Deepfake Texts and Voices: The New Risk to Employers AI Deepfake Voices Cybercriminals are now creating AI-generated voices and videos to sound like real people. These deepfake voices trick employees into sharing sensitive data, money, or files, to their supposed “boss.” Attackers use old emails, texts, or videos to make their message sound more realistic and believable. In addition, c

Chintana Bhaskara
Mar 162 min read


Engineering and Cybersecurity Ethics in the Age of AI
Article written by: Adrian Bermudez Article designed by: Adrian Bermudez and Natasha Gumpula The Engineering Foundations of AI Systems Twenty-first century artificial intelligence (AI) systems hinge on complex engineering infrastructures that combine large-scale data processing, machine learning algorithms, and specialized computing hardware. The development of modern AI typically follows a structured pipeline, including data collection, preprocessing, model training, validat
Adrian Bermudez
Mar 134 min read


How is AI affecting the environment?
Article written by: Sanika Lovlekar Article designed by: Sanika Lovlekar & Sanvi Desai Introduction A common topic which is generally brought up during practical conversations is “ Will AI take over the world and will it replace human jobs? ” Whether the answer to this question is yes or no, AI surely damages our planet. Even if AI doesn’t replace every single job in the world, if we continue to misuse it, the condition of Earth’s natural environment will decay. Over time, a
Sanika Lovlekar
Mar 103 min read


Quantum Computing and What It Means for Encryption
Article Written by: Rishi Ramachandran Article Des igned by: Rishi Ramachandran and Natasha Gumpula You may have heard the phrase quantum computing tossed around and wondered what it actually means, and more importantly, why people in cybersecurity care so much about it all of a sudden. The short answer is that quantum computing has the potential to change how computers solve problems, and in doing so, it could break the encryption systems that protect almost everything we d

Rishi Ramachandran
Mar 73 min read


What are Cookies?
Article Written by: Jia Fletcher Article Des igned by: Jia Fletcher & Sanvi Desai (Image from myonlinemarketing.ch ) Not Your Regular Cookie Do you know what cookies are? No—I’m not talking about the delectable, chocolatey desserts you’re now suddenly craving. I’m talking about web cookies . Does that ring a bell? Most times when you open a new website, you may see a popup that asks you to either “accept all cookies” or adjust your cookie preferences. What exactly are these

Jia Fletcher
Feb 273 min read


The Dark Side of QR Codes: How a Simple Convenience Became a Risk
Article Written by: Chintana Bhaskara Article Designed by: Chintana Bhaskara and Natasha Gumpula A Convenience Turned Into a Trap One scan is all it takes. A quick snap on your phone camera of a QR code at a public parking lot, in an email, on a poster, and now you’ve just given hackers all your personal data. Something that was created for the convenience of people has become one of the easiest traps that people fall into all the time. QR codes were built for the convenience

Chintana Bhaskara
Feb 243 min read


Recent Russian hacks on Dutch public infrastructure
Article Written by: Aryan Singh Article Designed by: Aryan Singh & Sanvi Desai What comes to mind when you hear the word “cyberattack”? When people think of cyberattacks, they usually think of attackers targeting computers and websites. But that is quickly changing. Today, cyberattacks are hitting physical infrastructure we rely on every day. Since these systems are run by computers, they are increasingly becoming new targets for hackers. A recent example of this happened in
Aryan Singh
Feb 183 min read


Thinking Like An Attacker: How Social Engineering Works
Article Written by: Avni Sharma Article Designed by: Avni Sharma and Natasha Gumpula Phishing is one of the most common forms of cyberattacks today, and it often sounds surprisingly realistic. Attackers craft emails or messages that look legitimate, convincing victims to click links, share sensitive information, or even transfer money. This is part of a broader strategy known as social engineering, where criminals use psychological tactics to gain trust and manipulate people
Avni Sharma
Feb 172 min read


Nvidia and OpenAI: An Alliance for the Future
Article Written by: Jia Fletcher Article Designed by: Jia Fletcher & Sanvi Desai Over 90% of leading businesses utilize AI. Artificial intelligence has become a prominent force in our everyday lives, making its way into businesses and homes alike. Now, two leading companies in the artificial intelligence industry– Nvidia and OpenAI –have just made history. On September 22, 2025 , Nvidia and OpenAI publicly announced their partnership. The two companies both have significant

Jia Fletcher
Feb 113 min read


The Hidden Life of Your Data: What Apps Really do Behind the Scenes
Article Written By: Chintana Bhaskara Article Designed By: Chintana Bhaskara and Natasha Gumpula Hidden Data Flow A study shows that of the 297 popular health and fitness apps , found that there are about 8 different permissions asked, including sensitive information like your location or device information. Even though most apps state that they don’t share your data with outside sources, it has shown to be untrue. Grund, Held & Bero states that researchers have discovered t

Chintana Bhaskara
Feb 103 min read


Cyber Security for Cardiac Devices
Article Written By: Iyithihya Prakasan Article Designed By: Iyithihya Prakasan & Sanvi Desai Ever wondered about the possibilities of a pacemaker being a threat? What is the purpose of a pacemaker in the human body? A pacemaker is a device that helps you regulate the timing and sequence of your heartbeat. It cannot exactly replace your heart but can help regulate your heartbeat artificially. Image from verywell health Functioning of pacemakers Once installed, the pacemaker

Iyithihya Prakasan
Feb 53 min read


How to see if your data has been leaked
Article written by: Eshaan Jagpal Article designed by: Natasha Gumpula and Eshaan Jagpal What is a data leak and how can it occur? A data leak is when there is an unwanted disclosure of personal information from a system or network to an external party. A data leak can occur if a company’s infrastructure is weak and an attacker manages to infiltrate their data base. From there, the attacker gains access and leaks the private information of the numerous customers the company

Eshaan Jagpal
Feb 42 min read


Fremont Ambassador Workshop
Article written by: Natasha Gumpula & Sanvi Desai Picture featuring Akshaj Khanduri, Shanaya Shah, Anushri Bhatia On November 14, 2025, Cyber For Youth had the opportunity to host their first ever workshop for 6th-8th grade students at Prince of Peace through the Ambassador Program . During the session, they explored key digital safety topics, diving into cyberbullying, different types of cyberbullying, password safety, and the importance of maintaining a positive digital f

Sanvi Desai
Jan 233 min read


5 Overlooked Cybersecurity Tips That Actually Make a Difference
Here are 5 tips that often get overlooked, yet are simple to implement and can make a huge impact on your online security.

Rishi Ramachandran
Jan 234 min read


What comes to mind when you hear the word “cyberattack”?
Article written by: Aryan Singh Article designed by: Aryan Singh and Natasha Gumpula When people think of cyberattacks, they usually think of attackers targeting computers and websites. But that is quickly changing. Today, cyberattacks are hitting physical infrastructure we rely on every day. Since these systems are run by computers, they are increasingly becoming new targets for hackers. A recent example of this happened in the Netherlands, where a Russian cyberattack hit t
Aryan Singh
Jan 223 min read


Cyber-attack disrupts European airports, causing hundreds of delays
A recent cyberattack on European airports shows this high risk and how quickly digital weaknesses can turn into real world consequences.

Rishi Ramachandran
Jan 152 min read
bottom of page
