‏Athena Martinez is a security expert/analyst geek with almost 5 years of experience, writes on various topics pertaining to internet security with latest happening in the IT world thoroughly.

Why a Digital Technology Company Should Go Global

Many digital technology companies today show the tendency to go global. There obviously are many advantages of going global, and that’s what makes companies take such a step. For technology companies, unlike companies that deal with physical products, it’s rather easy to have a global presence. Choices, at all levels, are multifaceted while there is

[ Read More ]

24 Northeastern Ontario Hospital Hacking Incident, The Aftermath

Twenty-four Northeastern Ontario hospitals were victims of the latest cyber attack with the use of zero-day exploits. Zero-day exploits are unknown security bugs in software that are actively exploited by hackers in order to gain control, launch malware or open other vulnerabilities in the target system. The attack estimated to have occurred last January 16,

[ Read More ]

Cyber Security Hacking Tools You Must Be Aware Of

Not all cyber attacks are caused by newly developed tools, nor by advanced hackers using zero-day exploits. Many of the hacks occur due to the use of off-the-shelf hacking tools and exploits, which are available for download on the Internet today. A pattern for use of off-the-shelf hacking tools was detected 5 African states: Ivory

[ Read More ]

The Importance of Security in Mergers & Acquisitions

Mergers and Acquisitions- big things happening in the world of business. M&As have yielded wonderful results and have even resulted in the genesis of some of the most successful of business firms. Well, let’s look at another aspect of the M&A process. Typically seen as a mere boardroom thing, there are other aspects of M&A

[ Read More ]

How to Secure Your ACS (Access Control System)

We live in a world where cybercrime has become a very common thing. Cybercriminals, who are turning more and more sophisticated with evolving technology, are always on the lookout for security holes that they can exploit to access systems, devices and networks to steal all kinds of data, ranging from corporate data to sensitive personal

[ Read More ]

Story Behind the DDoS Attack VS Boston Children Hospital

A man from Massachusetts was found guilty of a cyber attack against a healthcare institution and sentenced for 10 years in prison. His name is Martin Gottesfeld, found guilty by the U.S. District Court under Judge Nathaniel Gorton. “It was your arrogance and misplaced pride that has been on display in this case from the

[ Read More ]

Phone Call-Based Spear Phishing: Bank of America Alerted

The Better Business Bureau has warned banks, especially Bank of America and their depositors/creditors to be alert of a new phishing attack using a newer social engineering technique. Some victims of the new phishing attack suddenly realized that their bank accounts were totally wiped-out of funds, even without remembering if she gave her banking information

[ Read More ]

Amazon’s Ring Security System, Beware! You Are Being Watched

An interesting saga that is making rounds on the internet is that Amazon’s Ring devices granted the company’s Ukraine-based research and development team as well as U.S. executives and engineers a free round the clock access to live feeds from some customer’s cameras, obviously, Ring denies the claim. Regardless of whether they needed the information

[ Read More ]

Chinese Scammers Use Social Engineering to Swindle $18.6M

Fraud transaction through clever social engineering enabled Chinese phishers in successfully swindling an estimated $18.6 million from Tecnimont SpA’s Indian branch. With a cleverly written email that heavily resembles Pierrorberto Folgiero’s (the company’s Group CEO) was sent to Tecnimont Pvt Ltd, the phishers were able to persuade decision makers in the company’s India office to

[ Read More ]

How to Protect Your Website From a Cyber Attack

Your website is your calling card to attract customers, and an unexpected cyber-attack can cost you both time and money. What types of activity are you monitoring from the back end? With the right tools, your website can increase its security and prevent an attack. To avoid becoming the next victim, it’s time to take

[ Read More ]