top of page


What are Cookies?
Article Written by: Jia Fletcher Article Des igned by: Jia Fletcher & Sanvi Desai (Image from myonlinemarketing.ch ) Not Your Regular Cookie Do you know what cookies are? No—I’m not talking about the delectable, chocolatey desserts you’re now suddenly craving. I’m talking about web cookies . Does that ring a bell? Most times when you open a new website, you may see a popup that asks you to either “accept all cookies” or adjust your cookie preferences. What exactly are these

Jia Fletcher
5 days ago3 min read


The Dark Side of QR Codes: How a Simple Convenience Became a Risk
Article Written by: Chintana Bhaskara Article Designed by: Chintana Bhaskara and Natasha Gumpula A Convenience Turned Into a Trap One scan is all it takes. A quick snap on your phone camera of a QR code at a public parking lot, in an email, on a poster, and now you’ve just given hackers all your personal data. Something that was created for the convenience of people has become one of the easiest traps that people fall into all the time. QR codes were built for the convenience

Chintana Bhaskara
Feb 243 min read


Recent Russian hacks on Dutch public infrastructure
Article Written by: Aryan Singh Article Designed by: Aryan Singh & Sanvi Desai What comes to mind when you hear the word “cyberattack”? When people think of cyberattacks, they usually think of attackers targeting computers and websites. But that is quickly changing. Today, cyberattacks are hitting physical infrastructure we rely on every day. Since these systems are run by computers, they are increasingly becoming new targets for hackers. A recent example of this happened in
Aryan Singh
Feb 183 min read


Thinking Like An Attacker: How Social Engineering Works
Article Written by: Avni Sharma Article Designed by: Avni Sharma and Natasha Gumpula Phishing is one of the most common forms of cyberattacks today, and it often sounds surprisingly realistic. Attackers craft emails or messages that look legitimate, convincing victims to click links, share sensitive information, or even transfer money. This is part of a broader strategy known as social engineering, where criminals use psychological tactics to gain trust and manipulate people
Avni Sharma
Feb 162 min read


Nvidia and OpenAI: An Alliance for the Future
Article Written by: Jia Fletcher Article Designed by: Jia Fletcher & Sanvi Desai Over 90% of leading businesses utilize AI. Artificial intelligence has become a prominent force in our everyday lives, making its way into businesses and homes alike. Now, two leading companies in the artificial intelligence industry– Nvidia and OpenAI –have just made history. On September 22, 2025 , Nvidia and OpenAI publicly announced their partnership. The two companies both have significant

Jia Fletcher
Feb 113 min read


The Hidden Life of Your Data: What Apps Really do Behind the Scenes
Article Written By: Chintana Bhaskara Article Designed By: Chintana Bhaskara and Natasha Gumpula Hidden Data Flow A study shows that of the 297 popular health and fitness apps , found that there are about 8 different permissions asked, including sensitive information like your location or device information. Even though most apps state that they don’t share your data with outside sources, it has shown to be untrue. Grund, Held & Bero states that researchers have discovered t

Chintana Bhaskara
Feb 103 min read


Cyber Security for Cardiac Devices
Article Written By: Iyithihya Prakasan Article Designed By: Iyithihya Prakasan & Sanvi Desai Ever wondered about the possibilities of a pacemaker being a threat? What is the purpose of a pacemaker in the human body? A pacemaker is a device that helps you regulate the timing and sequence of your heartbeat. It cannot exactly replace your heart but can help regulate your heartbeat artificially. Image from verywell health Functioning of pacemakers Once installed, the pacemaker

Iyithihya Prakasan
Feb 53 min read


How to see if your data has been leaked
Article written by: Eshaan Jagpal Article designed by: Natasha Gumpula and Eshaan Jagpal What is a data leak and how can it occur? A data leak is when there is an unwanted disclosure of personal information from a system or network to an external party. A data leak can occur if a company’s infrastructure is weak and an attacker manages to infiltrate their data base. From there, the attacker gains access and leaks the private information of the numerous customers the company

Eshaan Jagpal
Feb 42 min read


Fremont Ambassador Workshop
Article written by: Natasha Gumpula & Sanvi Desai Picture featuring Akshaj Khanduri, Shanaya Shah, Anushri Bhatia On November 14, 2025, Cyber For Youth had the opportunity to host their first ever workshop for 6th-8th grade students at Prince of Peace through the Ambassador Program . During the session, they explored key digital safety topics, diving into cyberbullying, different types of cyberbullying, password safety, and the importance of maintaining a positive digital f

Sanvi Desai
Jan 233 min read


5 Overlooked Cybersecurity Tips That Actually Make a Difference
Here are 5 tips that often get overlooked, yet are simple to implement and can make a huge impact on your online security.

Rishi Ramachandran
Jan 234 min read


What comes to mind when you hear the word “cyberattack”?
Article written by: Aryan Singh Article designed by: Aryan Singh and Natasha Gumpula When people think of cyberattacks, they usually think of attackers targeting computers and websites. But that is quickly changing. Today, cyberattacks are hitting physical infrastructure we rely on every day. Since these systems are run by computers, they are increasingly becoming new targets for hackers. A recent example of this happened in the Netherlands, where a Russian cyberattack hit t
Aryan Singh
Jan 213 min read


Cyber-attack disrupts European airports, causing hundreds of delays
A recent cyberattack on European airports shows this high risk and how quickly digital weaknesses can turn into real world consequences.

Rishi Ramachandran
Jan 152 min read


Ethics of AI: Can it really be fair?
Article written by: Lohitha Vallepalli Article designed by: Lohitha Vallepalli & Sanvi Desai Can AI Really Be Fair? Every time you go online, AI is quietly working behind the scenes, suggesting videos, sorting your messages, or deciding what shows up first on your feed. These systems are constantly making choices for us , even if we don’t notice them. As AI becomes such a normal part of our daily lives, it’s worth asking a bigger question: Are these decisions fair for everyon

Lohitha Vallepalli
Jan 113 min read


What are cookies?
Article written by: Jia Fletcher Article designed by: Jia Fletcher and Natasha Gumpula (Image from myonlinemarketing.ch ) Not Your Regular Cookie Do you know what cookies are? No—I’m not talking about the delectable, chocolatey desserts you’re now suddenly craving. I’m talking about web cookies . Does that ring a bell? Most times when you open a new website, you may see a popup that asks you to either “accept all cookies” or adjust your cookie preferences. What exactly are th

Jia Fletcher
Jan 103 min read


Only 1 in 4: It's Time for Women to Join the Cybersecurity Frontier
Article written by: Lakkshanasre Viyasarramanujam Article designed by: Lakkshanasre Viyasarramanujam and Natasha Gumpula (Image from Scientific American ) The Stark Reality In a world that is pervaded by ever-evasive technology, do you know that only about 24% of the global cybersecurity workforce are women ? It’s crazy to think that while we know women are now considered in the equal standards of men today, the cybersecurity field still lacks clarity on this fact. This fact

Lakkshanasre Viyasarramanujam
Jan 24 min read


The Quiet Tracker: How Your Phone Gives Away Your Location
Article written by: Renee Kiran Article designed by: Renee Kiran and Samhita Srimath Kandali When “Location Off” isn’t enough Many people believe that turning off GPS is enough to protect their privacy. But phones are far more revealing than we think. Even if you disable GPS or location tracking, your phone can leak location data through network connections, app behavior, and background services. This information can be exploited by scammers, stalkers and especially, adverti
Renee Kiran
Dec 25, 20253 min read


WI-FI: Dangers of public Wi-fi and how to protect yourself while using public Wi-fi
Article written by: Shalom Oshioma Article designed by: Shalom Oshioma and Natasha Gumpula A lot of us have probably used Wi-Fi but do we know what it means and how it is used? In this article, we will discuss what Wi-fi is, how it works, and how to protect ourselves while on public Wi-Fi. What is Wi-Fi and how does it work? According to the Oxford English dictionary, Wi-fi is used as the abbreviation for‘wireless fidelity’ ( Oxford English Dictionary) (which is a system fo
Shalom Oshioma
Dec 21, 20253 min read


Ethics of Using Public Data to Train AI Models
Article written by: Neel Ramachandran Article designed by: Neel Ramachandran & Sanvi Desai AI systems rely heavily on large amounts of data to work well. Every time you use social media, upload photos, write posts, or interact online, you generate information that can help train these models. Public datasets, websites, forums, and images all play a huge role in shaping how AI learns patterns and makes predictions. This data allows AI to improve its creation of useful outputs.

Neel Ramachandran
Dec 16, 20252 min read


Why Cybersecurity might be a future-proof career path
Article written by: Tanisha Arora Article designed by: Tanisha Arora & Sanvi Desai “ AI will steal all our jobs! ” Now that’s a common phrase going around these past couple of years. And honestly, it’s a phrase that’s pretty believable at its face value. Artificial Intelligence has been developing rapidly in almost every field imaginable ranging from medicine and engineering to art and music. Everyday there’s a new article on CNN regarding innovations in the field, some that
Tanisha Arora
Dec 12, 20252 min read


Artificial Intelligence as a Double-Edged Sword: Cyber Attacks and Defenses in the Age of Machine Learning
Article written by: Adrian Bermudez Designed by: Adrian Bermudez and Natasha Gumpula One of the most transformative forces in modern cybersecurity is now artificial intelligence (AI) ; strengthening defenses (improving an organization’s ability to protect itself), accelerating detection (speeding up the process of finding a cyber attack), and automating responses (taking action on its own once a threat has been detected). Yet, the capabilities of cybercriminals and state-
Adrian Bermudez
Dec 10, 20255 min read
bottom of page
