‏Athena Martinez is a security expert/analyst geek with almost 5 years of experience, writes on various topics pertaining to internet security with latest happening in the IT world thoroughly.

Highlights Of China Vs Amnesty International Hong Kong Cyber Attack

Hong kong is considered as an SAR or Special Administrative Region, it kept its own internal ministerial government directly elected by Hong Kong people and they continue to use their HK$ as currency. But seems like that the “autonomy” does not end there when it comes to cyberspace, as hacker groups allegedly linked with Beijing

[ Read More ]

These Are The Emerging Cybersecurity Threats Of 2019

The Cyber Security arms race between hackers and security professionals took another turn in 2018 as the escalation of technology between the two sides continues. According to the Cisco’s 2018 Annual Cybersecurity Report, hackers layered their attacks with new techniques and innovations that challenged the cybersecurity defenses of organizations across the world. According to the

[ Read More ]

Major IT Issues: Threats Posed By Mobile Fraud & Account Theft

Smartphones and other mobile devices such as tablets and smartwatches are fast becoming more “personal computers” than the PC. People interact with these devices and store more personally identifiable information in them more than any laptop or desktop computer. In today’s technology-driven world, even the first thing to do after waking-up is checking the notification

[ Read More ]

Beapy Cryptojacking Malware: The Return Of Eternal Blue Exploit

The Eternal Blue exploit, the infamous Windows bug that the U.S. National Security Agency weaponized and was eventually leaked by the Shadow Brokers hacking group, which was then later used for the successful WannaCry ransomware campaign in 2017 is re-emerging. WannaCry launched ransomware into public prominence and even made an estimated $4 billion profit for

[ Read More ]

What Went Wrong: The 2019 Humble Bundle Security Breach Case

Humble Bundle, the digital storefront for video games is a blessing for indie game developers for at least 8 years now. The company which now operates as a subsidiary of Ziff Davis since October 2017, has been a strong force of distributing indie game titles that will otherwise are not visible to a typical gamer.

[ Read More ]

The Basics Of Choosing The Best Webhosting Service

How to choose a web hosting plan: Various vendors offer webhosting service, but how should people choose which server to use? The point is the balance between cost and functionality. The cost of the webhosting server can vary considerably from a few dollars to several thousand dollars or more a month. What is the difference

[ Read More ]

2019 In-Review: The Cybersecurity Risks Involving Schools Are Real

Educational institutions are where we shape our knowledge in preparation for our adulthood. For every field of study, time needs to be spent in a curriculum designed in order to maximize learning opportunities, or that should be the case. In the field of IT, especially in cybersecurity, no school or a University can claim that

[ Read More ]

Espionage Malware Karkoff Campaign Revealed

Cisco Talos has revealed in a report that the new campaign initiated by a group of hackers responsible for DNSpionage earlier that uses malware to infiltrate target firms. The malware has the capability to use both regular http and dns-based communication to its command and control servers, moving data stolen from computers to the custody

[ Read More ]

Some of the Worst Passwords of 2019

Cybersecurity experts always advocate for a strong and unique password, and it is one of their top priority. They also continually identify the different patterns that make a strong, unique password. However, not many take this recommendation seriously, because they think it is difficult to remember or they are not able to come up with

[ Read More ]

Bodybuilding.com Data Breach, A Year After A Phishing Attack

There are times, that the bad effects of a phishing attack are not immediately felt. The phishers usually run many parallel campaigns all at the same time, and due to volume may take a while for them to “schedule” a “follow-up” attack against a target after a successful phishing expedition. This what happened when bodybuilding.com,

[ Read More ]