Google Password Leak? What Really Happened and Why It Matters for Your Security

By Pranshu Amin If you are like me and spend a good chunk of time online you must have come across some headlines claiming Google’s passwords were leaked in June 2025 [1] (Cybernews, 2025), sparking concerns for millions of users. But what does this really mean? Was google really hacked or is there more to …

When Cryptography Meets Reality: The Challenges of Electronic Voting

ISEC 601 – FINAL GROUP TEACHING AID   List of Group Members: Pranshu Amin – 30302031; Hillary Ogoke – 30141713; Joy Aroh – 30302221; Israel Oni – 30085933; Mohammed Arab – 30129092 ​​  Introduction to E-Voting   For centuries, democratic elections have relied on paper ballots as the foundation of trust. Paper voting is simple, auditable, and familiar.  …

Inside the Jaguar Land Rover Cyberattack

Jaguar Land Rover (JLR) isn’t just England’s largest carmaker, it’s an icon. From luxury SUVs to rugged Defenders, its vehicles are part of a global story. Behind that story is a workforce of approximately 33,000 people (an additional 100,000 jobs across its supply chain), a far-flung supply chain, and a digital nervous system that ties …

PBKDF2 – History, Usage, and Future – Teaching Aide

GitHub link to the website code: https://github.com/Benedict-Kpaduwa/PBKDF2-Project/ Storing and transmitting information securely, as well as ensuring its integrity, authenticity, and confidentiality are some of the most important problems faced within a field of cryptography. There are all kinds of encrypting, hashing and signing algorithms, all relying on some secret password. One of the biggest problems …

From One Tip to Thousands of Connected Scams: The 2025 Online Gaming Fraud Network

In 2025, online scams continue to escalate, with hundreds of sites recently exposed as malicious online gaming and gambling platforms[1]. These sites lure victims by advertising themselves as the “#1 crypto gaming platform,” often claiming ties to billionaires such as Elon Musk, Bill Gates, and MrBeast to appear credible [3]. Beyond fake endorsements, the platforms …

When Law Enforcement Raids a Crypto Exchange: Insights from Canada’s TradeOgre Shutdown

Cryptocurrency exchanges are frequently praised for their potential for decentralization, pseudonymity, and ability to resist censorship. However, for numerous regulators and law enforcement bodies, they also attract misuse: money laundering, illegal financing, and untraceable asset transfers. In 2025, Canada embarked on a new phase in this narrative with the shutdown of TradeOgre, signifying what seems …

COINBASE INSIDER BREACH AND RANSOM DEMAND: AN EMERGING RISK IN CRYPTO PRIVACY

It was one of the most high-profile security breaches ever to hit the cryptocurrency industry, and it happened in 2025 when Coinbase, America’s largest cryptocurrency exchange, disclosed a sophisticated insider attack that compromised personal details of some 70,000 customers.

The Clock is Ticking on TikTok: Algorithms, Security and the Battle for Control

Over the past two years, Tiktok has found themselves at the center of the most important digital sovereignty battles of our time. What was looking like a political dispute between the US government and a foreign-owned Chinese social media company on the surface, is now a debate about who controls the algorithms, safeguards data and …

£2.3 Million Fine for 23andMe: A Warning on Weak Authentication – June 2025

When most people think of data breaches, they imagine stolen credit cards or leaked emails. But in 2023, DNA testing giant 23andMe exposed something far more intimate: its customers’ genetic information. Fast forward to June 2025, and UK regulators fined the company £2.3 million for failing to protect sensitive genetic data. This included family trees, …

Confederation of the UNCs – A Brief Look into A Series of the Salesforce Data Theft Exploit

CAUTION: This post is most-likely riddled with a prematurely conceived notion of someone who thinks they can fix cybersecurity for the defenders (we have a lot of those, don’t we?), but hear me out and approach this from the point of view of someone who genuinely wants to work with another person (and another person, …