Here in Cybersecurity Insecurity We have Linked in, a Student Navigation and communication Website to help students while on there education journey. Here we have an example of "Phishing". Notices and warnings are being posted to get students to Click and navigate the user to Credential stealing Sites. Some even use LinkedIn's own lnkd.in URL shortener to make the phishing links look legitimate. We can protect ourselves form a situation like this by activating two-step verification, its the single most important thing you can do for any online account. Even if someone steals your password, they won't be able to log in without the verification code.
Link: https://www.techlicious.com/blog/linkedin-phishing-scam-uses-comment-replies-to-harvest-log-ins/
Author: Palash Volvoikar
Source: Techlicous, Tech made Simple
Relevance: January 16, 2026
Accuracy: They are 100% accurate, we see real life examples of this play out, and This is something that Millions of people are have been victims of.
Purpose and Objectivity: This Articles purpose is to educate people how to Deal both identify and Prevent The same thing from happening to them. To raise awareness to the Problem and Hopefully Decrease the number of Phishing scams that take place.
This ransom hack on New Zealand's largest health portal is being pinned as one of the country's biggest cybersecurity incidents, in this Example of a Cybersecurity Attack, The hackers threatened to release more than 400,000 documents stolen from about 126,000 Health patients if the private company failed to pay $60,000 by 5am Tuesday. here Both the patients and the Health Institution was at risk. The Patients because their private information is being released and it could expose them and bring unwanted attention to outsiders. and the health institute because all of there documentation is about to be lost, and $60,000 is on the line. and as be have learned, even if they paid it, nothing is stopping them from Coming back and doing the same thing, so the situation needs to be addressed. In a situation as big as this, The only thing that could really be done is to report the incident to authorities like CISA or the FBI, identify the ransomware strain, and attempt recovery.
Author: Russell Palmer
Source: New Zealand Politics
Relevance: January 6, 2026
Accuracy: This Is very accurate, I've heard about people who have had to deal with things like this, Black Hat Hackers are a real Thing, and they oftentimes put big organizations like this in sticky situations.
Purpose and Objectivity: The purpose of this article was to help open the eyes of Those who may not be privy to Knowing these types of attack exist. They help prepare and equip those who haven't experienced this type of attack. (in hopes they don't have to) They are giving them the knowledge of how to deal with it if In-Fact it does.
Here during this Unit I Learned the importance of Cybersecurity. Not only is it important to Know how to Spot and know when not to click certain links or navigate to certain webpages. But It's also just as important to know how to deal with an attack if in-fact you Happen to to experience it. This unit has helped to broaden my understanding of the Different ways Cyber attacks can occur.