top of page


What comes to mind when you hear the word “cyberattack”?
Article written by: Aryan Singh Article designed by: Aryan Singh and Natasha Gumpula When people think of cyberattacks, they usually think of attackers targeting computers and websites. But that is quickly changing. Today, cyberattacks are hitting physical infrastructure we rely on every day. Since these systems are run by computers, they are increasingly becoming new targets for hackers. A recent example of this happened in the Netherlands, where a Russian cyberattack hit t
Aryan Singh
15 hours ago3 min read


Cyber-attack disrupts European airports, causing hundreds of delays
A recent cyberattack on European airports shows this high risk and how quickly digital weaknesses can turn into real world consequences.

Rishi Ramachandran
Jan 152 min read


Ethics of AI: Can it really be fair?
Article written by: Lohitha Vallepalli Article designed by: Lohitha Vallepalli & Sanvi Desai Can AI Really Be Fair? Every time you go online, AI is quietly working behind the scenes, suggesting videos, sorting your messages, or deciding what shows up first on your feed. These systems are constantly making choices for us , even if we don’t notice them. As AI becomes such a normal part of our daily lives, it’s worth asking a bigger question: Are these decisions fair for everyon

Lohitha Vallepalli
Jan 113 min read


What are cookies?
Article written by: Jia Fletcher Article designed by: Jia Fletcher and Natasha Gumpula (Image from myonlinemarketing.ch ) Not Your Regular Cookie Do you know what cookies are? No—I’m not talking about the delectable, chocolatey desserts you’re now suddenly craving. I’m talking about web cookies . Does that ring a bell? Most times when you open a new website, you may see a popup that asks you to either “accept all cookies” or adjust your cookie preferences. What exactly are th

Jia Fletcher
Jan 103 min read


Ethics of Using Public Data to train AI models - Protecting publicly posted data
Article written by: Neel Ramachandran Article designed by: Neel Ramachandran & Sanvi Desai AI systems rely heavily on large amounts of data to work well. Every time you use social media, upload photos, write posts, or interact online, you generate information that can help train these models. Public datasets, websites, forums, and images all play a huge role in shaping how AI learns patterns and makes predictions . This data allows AI to improve its creation of useful outpu

Neel Ramachandran
Jan 52 min read


Only 1 in 4: It's Time for Women to Join the Cybersecurity Frontier
Article written by: Lakkshanasre Viyasarramanujam Article designed by: Lakkshanasre Viyasarramanujam and Natasha Gumpula (Image from Scientific American ) The Stark Reality In a world that is pervaded by ever-evasive technology, do you know that only about 24% of the global cybersecurity workforce are women ? It’s crazy to think that while we know women are now considered in the equal standards of men today, the cybersecurity field still lacks clarity on this fact. This fact

Lakkshanasre Viyasarramanujam
Jan 24 min read


The Quiet Tracker: How Your Phone Gives Away Your Location
Article written by: Renee Kiran Article designed by: Renee Kiran and Samhita Srimath Kandali When “Location Off” isn’t enough Many people believe that turning off GPS is enough to protect their privacy. But phones are far more revealing than we think. Even if you disable GPS or location tracking, your phone can leak location data through network connections, app behavior, and background services. This information can be exploited by scammers, stalkers and especially, adverti
Renee Kiran
Dec 25, 20253 min read


WI-FI: Dangers of public Wi-fi and how to protect yourself while using public Wi-fi
Article written by: Shalom Oshioma Article designed by: Shalom Oshioma and Natasha Gumpula A lot of us have probably used Wi-Fi but do we know what it means and how it is used? In this article, we will discuss what Wi-fi is, how it works, and how to protect ourselves while on public Wi-Fi. What is Wi-Fi and how does it work? According to the Oxford English dictionary, Wi-fi is used as the abbreviation for‘wireless fidelity’ ( Oxford English Dictionary) (which is a system fo
Shalom Oshioma
Dec 21, 20253 min read


Ethics of Using Public Data to Train AI Models
Article written by: Neel Ramachandran Article designed by: Neel Ramachandran & Sanvi Desai AI systems rely heavily on large amounts of data to work well. Every time you use social media, upload photos, write posts, or interact online, you generate information that can help train these models. Public datasets, websites, forums, and images all play a huge role in shaping how AI learns patterns and makes predictions. This data allows AI to improve its creation of useful outputs.

Neel Ramachandran
Dec 16, 20252 min read


Why Cybersecurity might be a future-proof career path
Article written by: Tanisha Arora Article designed by: Tanisha Arora & Sanvi Desai “ AI will steal all our jobs! ” Now that’s a common phrase going around these past couple of years. And honestly, it’s a phrase that’s pretty believable at its face value. Artificial Intelligence has been developing rapidly in almost every field imaginable ranging from medicine and engineering to art and music. Everyday there’s a new article on CNN regarding innovations in the field, some that
Tanisha Arora
Dec 12, 20252 min read


Artificial Intelligence as a Double-Edged Sword: Cyber Attacks and Defenses in the Age of Machine Learning
Article written by: Adrian Bermudez Designed by: Adrian Bermudez and Natasha Gumpula One of the most transformative forces in modern cybersecurity is now artificial intelligence (AI) ; strengthening defenses (improving an organization’s ability to protect itself), accelerating detection (speeding up the process of finding a cyber attack), and automating responses (taking action on its own once a threat has been detected). Yet, the capabilities of cybercriminals and state-
Adrian Bermudez
Dec 10, 20255 min read


Should social media apps be held responsible for our privacy?
Article written by: Paola Castillo Ramos Designed by: Paola Castillo Ramos & Sanvi Desai In 2024, a study revealed that over 75 million Americans gave their phone number out to enterprises without knowing they were concurrently accepting the enterprise to give that same number to advertisers. The facilitated diffusion of private information online consistently raises concerns on what other details are made accessible unknowingly. Privacy in itself involves many aspects. Alt
Paola Castillo Ramos
Dec 6, 20253 min read


Children’s Safety on Popular Video Game Platform: Roblox
Article written by: Sanika Lovlekar Designed by: Natasha Gumpula and Sanika Lovlekar Image by Times of India Introduction: Have you heard about the latest age verification method that the online gaming platform Roblox has introduced last week? This is the positive aftermath of the recent drama circling around Roblox. When the problem was escalating, outraged state attorneys and parents sued the company because of its prolonged child predator problem. The “ Roblox v. Schlep
Sanika Lovlekar
Dec 4, 20253 min read


Catfishing
Article written by: Palak Tiwari Article designed by: Palak Tiwari & Sanvi Desai Catfishing is one of those things that sounds like it only happens to someone else until a random text pops up on your phone at midnight and suddenly the internet feels like a maze. Picture this. You are eating cereal, half awake, when you get a message from an unknown number that says, I tried calling you. Call me back. You stare at it like your phone just became self aware. The truth is that c

Palak Tiwari
Dec 1, 20253 min read


AI In Schools: Yay or Nay?
Article written by: Jia Fletcher Article designed by: Jia Fletcher and Natasha Gumpula AI in schools has been a hot topic, especially in the past few years. AI has taken over sectors like healthcare and finance–and our school systems seem to be next. At first, AI was shunned from schools due to its manipulation as a cheating device. However, it’s now starting to become more widely accepted, seen as a tool to help both students and teachers alike for a better learning experien

Jia Fletcher
Nov 29, 20253 min read


What Really Happens on the Dark Web?
Article written by: Chintana Bhaskara Article designed by: Chintana Bhaskara & Sanvi Desai Beneath the Surface In the news we see on tv, the dark web is described to be a shady and scary world of crime, but the reality is that it is much more complex. It is a section of the internet we use in our everyday lives, and is purposely hidden to only be accessible through a special software , and built to work around encryption. This hidden world attracts a wide range of people fr

Chintana Bhaskara
Nov 26, 20253 min read


The Origins and Evolution of Phishing Attacks
Article written by: Rishi Ramachandran Article designed by: Rishi Ramachandran & Sanvi Desai You probably receive a couple of suspicious emails each week, if not each day, and you end up deleting them without even a thought. But what if one of those emails was not merely annoying spam, but a cleverly crafted ploy to steal your identity or the secrets of your business? That is the work of phishing , which has evolved into a smarter and more sinister threat over the years. Im

Rishi Ramachandran
Nov 23, 20253 min read


Oversharing on Social Media
Article written by: Aadit Singh Article designed by: Aadit Singh and Natasha Gumpula What are the risks of oversharing on social media and how can you stay safe? Social media oversharing occurs when individuals share too many personal details online, such as their whereabouts, habits, or intimate details concerning relationships and finances. It is simple to overlook that once we post online, these things are typically there for the long haul and could extend much further t

Aadit Singh
Nov 21, 20253 min read


Healthcare Cyber Attacks
Article written by: Srishti Bhattacharya Article designed by: Srishti Bhattacharya & Palak Tiwari What is a healthcare cyberattack? In 2024, about 92% of healthcare institutions and organizations experienced cyberattacks in the U.S., and these attacks averaged 19 days of downtime for these vital organizations. Cyberattacks against healthcare institutions are increasing through the years. Hackers break into patients’ personal electronic health records, harming patient privacy

Srishti Bhattacharya
Nov 17, 20253 min read


Top 4 Cyber Attacks: What They Are and How to Stay Safe
Article written by: Anvi Sharma Article designed by: Anvi Sharma & Palak Tiwari In our increasingly digital world, staying safe online has even been more crucial. With so much of our lives, from banking and shopping to communication and work, taking place online, the threat of cyberattacks is a constant reality. Cybercriminals are always refining their method to steal personal information, money, and data. While the landscape of cyber threats can seem intimidating, understand
Anvi G
Nov 2, 20255 min read
bottom of page
