Skip to main content
Sign up to Newsletter
SEARCH
NEWS
GUIDES
CAMPAIGNS
LEARN
IMPACT
ABOUT
DONATE
Impact Search
Our impact in the world
Content type:
Long Read
CrowdStrike: What the 2024 outage reveals about security
17th December 2024
Content type:
Examples
As Finland freezes DDoS attack paralyses heating systems
1st December 2017
Content type:
Examples
Cheap phones leave poorer users vulnerable
1st December 2017
Content type:
Examples
Internet of Things provides new tools for domestic abusers
1st December 2017
Content type:
Examples
Jharkhand government website leaks personal details of 1 million Aadhaar subscribers
1st December 2017
Content type:
Examples
Technical analyst explains inner workings of UK's NHSx contact tracing
20th May 2020
Content type:
Examples
Smartphones, laptops, IoT devices vulnerable to new BIAS Bluetooth attack
19th May 2020
Content type:
Case Study
"Betrayed by an app she had never heard of" - How TrueCaller is endangering journalists
28th May 2019
Content type:
Examples
Google launches encryption for lower-powered phones
17th May 2019
Content type:
Examples
‘BlueBorne’ Flaw Poses Serious Risk To Bluetooth Devices
1st April 2020
Content type:
Examples
Design flaw leaves Bluetooth devices vulnerable
1st April 2020
Content type:
Examples
Critical Bluetooth Vulnerability in Android (CVE-2020-0022) – BlueFrag
1st April 2020
Content type:
Examples
US intelligence chiefs warn of new data manipulation cyber threat
3rd May 2018
Content type:
Examples
Large telco secretly opens bank accounts using Aadhaar-linked eKYC
26th September 2018
Get Involved
Act with Us
Donate
Join