As technology keeps on improving, so do the digital threats that come with it. Staying aware of new cybersecurity risks isn’t just a technical skill anymore—it’s a crucial part of keeping our personal information, university accounts, and everyday digital life safe.
Remote working introduces major risks when employees or students access central systems from outside the secure campus or office network. When working from homes, cafes, or co-working spaces, your data is exposed to much weaker security controls.
Public Wi-Fi networks are convenient, but they are inherently risky. Attackers connected to the exact same café network can launch Man-in-the-Middle (MITM) attacks, allowing them to:
Security Tip: The risk becomes even greater when users access websites that do not use
HTTPSencryption. Without HTTPS, your data is sent as plain text, making it incredibly easy for hackers to capture and exploit. Always use a VPN on public Wi-Fi!
Unlike traditional cyberattacks that target computer systems, social engineering attacks target people. These attacks rely on manipulation, deception, and psychological tactics to trick individuals into revealing confidential information or performing unsafe actions.
Artificial Intelligence (AI) is a double-edged sword. It is completely transforming both cyber defense and cyberattacks. By 2025, AI is expected to play a central role in automated security frameworks worldwide.
Cybercriminals are increasingly using AI to analyze massive datasets incredibly quickly. They gather information from:
This allows them to craft highly personalized and convincing attacks at scale.
Example: AI-Generated Phishing Emails An attacker uses AI to scrape a college website and generate an email that perfectly mimics the writing style of the college principal. The email uses a spoofed address and urgently demands that the student pay a "late registration fee." The goal is to make the victim panic and act quickly without thinking—a classic social engineering trick amplified by AI.
On the defensive side, AI helps organizations strengthen their security posture by operating faster than humanly possible. AI systems help by:
Example: AI in Vulnerability Management A college runs thousands of devices—computers, printers, projectors, and servers. Some of them inevitably have outdated software with known vulnerabilities. An AI-powered vulnerability management system acts like an ultra-fast security inspector. It rapidly scans all devices, finds weaknesses, and automatically prioritizes the most critical security patches before attackers have a chance to exploit them.
Which of the following best describes a "Social Engineering" attack?