‏Athena Martinez is a security expert/analyst geek with almost 5 years of experience, writes on various topics pertaining to internet security with latest happening in the IT world thoroughly.

jQuery JavaScript Library, Target Of Pollution Attacks

We can safely say that the Internet and the World Wide Web today will not be possible without the use of a scripting language that most people often overlook, Javascript. Whether we like it or not, JavaScript made the web as interactive, usable and convenient to use, in fact disabling scripting will break the functionality

[ Read More ]

Is China Racial-Profiling Its Minority?

Mainland China has already started its massive facial database of all mainland Chinese citizens and possibly permanent residents of the country as well. Beijing is keen on monitoring the movements of people in the mainland. This is the key to transform China into a cohesive unit, with the opposition to the ruling leaders in Beijing

[ Read More ]

Minnesota’s Department of Human Service, Latest Victim Of Phishing

Minnesota’s Department of Human Services (DHS) headed by its Commissioner Tony Lourey has issued a document to both houses of Congress detailing its data breach happened with the department affecting 11,000 people. It only took the hackers to persuade a DHS employee in opening an “invoice” email, and the department normally receives 92,500 phishing/spam emails

[ Read More ]

Triton Hacker Group Attacks Saudi Petrochemical Company Again

FireEye, a mainstream cybersecurity consulting firm has recently exposed that a state-funded malware development group was behind an attempt to blow a Saudi-based Petrochemical facility using malware a second time. Called the “Triton” group, they have developed the eponymous malware, it takes control of machinery in order to overwork itself with the chance of eventual

[ Read More ]

Firm’s Convenience VS Security, A Free Choice

As we have emphasized in this website many times in the past, security and convenience are two opposing principles when it comes to the digital lifestyle of an individual or a business entity. Each time convenience becomes the focus for an entity, the natural side-effect of a wider attack surface is the result. The measure

[ Read More ]

7 Easy Steps To Secure Your Drupal Website

Let’s hope that all the Drupal website is updated and patched, and in that case, all the critical security flaw, Drupalgeddon2, is not likely to return. Even so, with the craze of cryptocurrency mining attack still lurking around the unpatched websites, here is a quick way to secure Drupal? Here is a list of 7 basic steps

[ Read More ]

Is Infrastructure-As-A-Service The Future Of Corporate Computing?

Ask any system administrator today, and we will hear from them that attempts from unknown outside parties infiltrating their systems are happening on a daily basis. Yes, guys welcome to the 21st-century corporate computing era. We live in a world where cyber warfare is raging globally, between nations, between firms and between groups and individuals.

[ Read More ]

VPN Apps Not Working As Intended, Exposed

As an IT professional for decades, we are always highlighting the importance of VPN when it comes to maintaining security and privacy. It is the most cost-effective way to isolate a connection from prying eyes, a VPN creates a secure virtual pipe from the user’s origin device to the VPN vendor’s exit node, wherever it

[ Read More ]

Hackers Can Use Unused Internet Explorer to Steal Data

This is no less than a shocker…Hackers can now use Internet Explorer to steal your data, that too even if you never use it. A security researcher has detected a zero-day vulnerability in Internet Explorer which would allow hackers to steal data. Security researcher John Page has published details and proof-of-concept code for the zero-day

[ Read More ]

A Quick Glimpse Of Hong Kong’s Cybersecurity Readiness

The Hong Kong Special Administrative Region has governed under a One-China, Two-systems policy since 1997. That means the great firewall of China which is enforced in the mainland is not applied in Hong Kong. It decides on its own about its internal policies when it comes to governance, including the responsibility of making sure that

[ Read More ]