‏Athena Martinez is a security expert/analyst geek with almost 5 years of experience, writes on various topics pertaining to internet security with latest happening in the IT world thoroughly.

Alternative Secure Email Infra For The Enterprise

Firms should always consider the worst-case scenario in their internal IT environment. The need to put in place procedures in the event of a disaster, and periodically update these procedures in order to be relevant to the current trends. IT leaders need to devise ways, a detailed description of what to do when the malware

[ Read More ]

Mac’s Zoom Client Camera Bug Discovered, Patch Required

Since webcams came into existence the product came with a huge “if”. The possibility of some other people accesses the webcam online when they least expect it. Webcams exploded in popularity in the late ‘90s, primarily for use in conjunction with early instant messaging services such as Yahoo and ICQ. Today, webcams are highly integrated

[ Read More ]

RubyGems Strong_Password Lib Infiltrated By Hackers

The Ruby library is ubiquitous, it is everywhere, as proven by the number of loyal developers it attracted to the platform for decades. With the availability of its library for various operating systems, it is one of the most cross-compatible programming languages today which is highly underrated. However, recently, the use of Ruby needs to

[ Read More ]

China’s BXAQ Spy App For Tourists of Xinjiang Questioned

Are you planning or already booked for a China-trip anytime soon? Then this is the news you cannot ignore, China’s border immigration agents at Xinjiang region are legally compelled to demand for tourists’ smartphone and its corresponding unlock codes before allowed entry. The confiscated smartphone will be returned to the tourist as soon as the

[ Read More ]

Basic Guide To Prevent Virus Infection

Here, we often interchange the word “virus” with the word “malware”. It is for the purpose of simplicity, as we focus our article to the actual story rather than falling for defining the types of nasty software that was involved in the news. In this article, we provide you a quick glimpse of all malware

[ Read More ]

Is Mozilla Stubborn? 17-Year Old Bug, Still Unpatched

Open-source apps have long been hailed for being more secure than proprietary software, for the reason that the availability of the source code means the higher chances that a bug can be seen easier. But this is not consistent, there are times the feature that has a bug for years is not a commonly used

[ Read More ]

Fundamentals Of A DDoS Attack

Distributed Denial of Service Attack (DDoS) is a critical cybersecurity concern that causes a service to stop by sending numerous processing requests from multiple computers to a target server over the network. DDoS basically is an expansion of the DoS attack, when multiple computers make simultaneously request service from a certain target in an effort

[ Read More ]

Turkey Gov’t: Marriott Hotel’s Fine Due To Data Breach

The Marriott Hotel chain data breach is one of our most covered Cybersecurity stories about Beijing denying the accusation from western powers that it was behind the data breach. We revisit this story, with Turkey imposing a hefty fine against the Marriott Hotel International firm to the tune of 1.5 million Turkish Lira (US$267,352). The

[ Read More ]

Youtube Now Takes Down “Instructional Hacking” Videos

For 19-years and still counting, Youtube has become a very important platform for online video content. Not only for leisure and pleasure, like those cat videos that we all love to watch, but also education-type of videos designed to inform people of whatever topic they wish to learn. In fact, as of this year, there

[ Read More ]

Myths In Cybersecurity That People Needs To Forget

Cyber attacks come in various presentation and packages, the damage range from “all systems feel normal” to “the sky is falling” scenarios. But one thing is for sure, users of all access levels, from system admins to end-users and consumers have a large role to play for the success or failure of cyber attacks perpetuated.

[ Read More ]