‏Athena Martinez is a security expert/analyst geek with almost 5 years of experience, writes on various topics pertaining to internet security with latest happening in the IT world thoroughly.

Online Freelance site Fiverr offers Illegal Private Spying Services

After Motherboard approached the company to comment, Fiverr removed a number of listings. A free-lance Fiverr site allows a company to hire a short-term application developer, logo designer or help with their social media accounts. Fiverr is also a place where you can purchase malware to illegally spy on your wife, pay someone to place

[ Read More ]

Apple iOS patching error, MoviePass data breach New Facebook privacy controls

You listen to the shared security podcast and discover the confidence you place in people, applications and technology… with your host, Tom Eston. Facebook announces new off-Facebook privacy controls, how Apple made everybody’s iOS system vulnerable and details of the massive MoviePass data breach in episode 83 of August 26, 2019. This week I read

[ Read More ]

7 Big Factors that makes Small Business at Risk

Small organizations still face a long list of threats to security. These threats and vulnerabilities should take precedence. Increasingly, cyber criminals are targeting smaller organisations. This makes small and medium-sized enterprises (SMBs) hard to find. They are also working with smaller budgets and staff constraints in the face of a long list of cyber threats,

[ Read More ]

Australia Banks warn Customers of a fresh PayID data violation

Banks have begun to warn customers of a new PayID data breach, which was reported late Friday to the NPP Australia new payment platform supervision. NPP Australia said that an unrevealed number of PayID records “and associated data in the Addressing Service were exposed by a vulnerability in one of the financial institutions sponsored into

[ Read More ]

All about Malware Trade and it’s Psychological Tricks

As a professional services consultant, I am pleased to meet customers around the world and talk to a wide range of IT security experts who are at the forefront of malware defence. One of my favorite topics is how people have started their IT careers, but I am frequently surprised by the number of people

[ Read More ]

Is Cloud-Computing An Inevitable Infrastructure To Embrace?

As the practical application of cloud computing becomes cheaper, there are still many people who still have vague anxieties about security. Examine the security of the public cloud itself and the dangers hidden in the operation of users, and explain the security strategy that should be considered in cloud utilization. The safety and security of

[ Read More ]

Common Ways For Countering Privileged Identity Theft Attacks

Work efficiency cannot be improved without an internal/external network environment these days; successful organizations are all data-driven entities. However, while the Internet comes with convenience, there is a risk of leaking personal information. There are various causes of identity theft, but one is sophisticated of malware such as targeted attack emails. Targeted attack emails are

[ Read More ]

Is North Korea Engaging With Cryptocurrency Cyberheist?

As reported by the Associated Press, some United Nations agents are investigating North Korea for allegedly launching 35 coordinated state-sponsored cyber attacks activities against 17 countries. The attacks were allegedly linked to the hermit country’s goal of raising enough funds to continue their weapons upgrade program. According to the Associated Press, North Korean regime was

[ Read More ]

Artificial Intelligence: Ally Or Enemy Of System Security?

The term “artificial intelligence” is now a keyword that has attracted a great deal of attention in the technological development of various fields. Image recognition, speech analysis, human interaction, medical use, surveillance camera security and economic analysis have an innovative impact on data management in the current day when data handling is commonplace. The existence

[ Read More ]