Google Password Leak? What Really Happened and Why It Matters for Your Security

By Pranshu Amin If you are like me and spend a good chunk of time online you must have come across some headlines claiming Google’s passwords were leaked in June 2025 [1] (Cybernews, 2025), sparking concerns for millions of users. But what does this really mean? Was google really hacked or is there more to …

When Cryptography Meets Reality: The Challenges of Electronic Voting

ISEC 601 – FINAL GROUP TEACHING AID   List of Group Members: Pranshu Amin – 30302031; Hillary Ogoke – 30141713; Joy Aroh – 30302221; Israel Oni – 30085933; Mohammed Arab – 30129092 ​​  Introduction to E-Voting   For centuries, democratic elections have relied on paper ballots as the foundation of trust. Paper voting is simple, auditable, and familiar.  …

Inside the Jaguar Land Rover Cyberattack

Jaguar Land Rover (JLR) isn’t just England’s largest carmaker, it’s an icon. From luxury SUVs to rugged Defenders, its vehicles are part of a global story. Behind that story is a workforce of approximately 33,000 people (an additional 100,000 jobs across its supply chain), a far-flung supply chain, and a digital nervous system that ties …

PBKDF2 – History, Usage, and Future – Teaching Aide

GitHub link to the website code: https://github.com/Benedict-Kpaduwa/PBKDF2-Project/ Storing and transmitting information securely, as well as ensuring its integrity, authenticity, and confidentiality are some of the most important problems faced within a field of cryptography. There are all kinds of encrypting, hashing and signing algorithms, all relying on some secret password. One of the biggest problems …