‏Athena Martinez is a security expert/analyst geek with almost 5 years of experience, writes on various topics pertaining to internet security with latest happening in the IT world thoroughly.

Basic Online Shopping Safety Guide For All

Online shopping at the privacy of one’s home or mobile device is very convenient because you can shop at any time, anywhere, without physically going to a brick and mortar store. In addition, you can even purchase heavy things can be delivered to your home. But just like a regular Thethreatreport.com reader, you should know

[ Read More ]

Russian-made FaceApp Accused Of Massive Facial Image Collection

We really are living in the future, with the growth and fast development of face recognition technology. It all started with the hardware, Android made face unlock a public feature starting with Android 4.0 Ice Cream Sandwich (ICS) in 2011, that was eight years ago. It was seen as a gimmick, as a static image

[ Read More ]

Personal Information Of Million Bulgarians Taxpayers Stolen

Bulgaria, an Eastern European country of 7 million people is a recent victim of a large-scale data breach, as its state tax agency’s tax information storage servers were hacked last June 2019. No other than its Minister of Finance, Vladislav Goranov issued a public apology for the incident that happened under his watch. Security researchers

[ Read More ]

How Cryptocurrencies Increase Transaction Security?

From time-to-time we feature cryptocurrency stories here in Thethreatreport. Hence, it is really necessary for us to explain what it is, in an easier to understand language for the newbies. This article is highly recommended to read before getting deeper with the cryptocurrency cybersecurity news that we feature in this website: The legal currency used

[ Read More ]

K12.com – 7Million Student’s Record Data Breach Exposed

Records show that K12.com, a web-based educational firm has suffered a massive 7-million student records breach due to an insecure version of MongoDB database server. Bob Dianchenko a security researcher at Comparitech has witnessed student data from K12.com was made public on June 25, 2019. According to his discovery, it took K12.com more than a

[ Read More ]

Are Companies Still Doubting Cloud-Computing?

The 2019 Access Management Index report revealed by Thales has provided a quick glimpse of how corporations’ top IT decision makers are coping with cloud-computing push by the industry. 49% of the 1050 IT corporate leaders suggest that they will not embrace cloud computing at this time, due to the issue of becoming a target

[ Read More ]

1,300+ Apps Bypass Android Permission Restrictions

Android 6.0 Marshmallow (and later) is hailed for giving its default user the capability to grant/deny granularly the permissions asked by apps, something that only rooted/custom roms users were able to do prior. However, contrary to the permissions feature, a study conducted by the University of Calgary, U.C. Berkeley, Universidad Carlos III de Madrid and

[ Read More ]

Alternative Secure Email Infra For The Enterprise

Firms should always consider the worst-case scenario in their internal IT environment. The need to put in place procedures in the event of a disaster, and periodically update these procedures in order to be relevant to the current trends. IT leaders need to devise ways, a detailed description of what to do when the malware

[ Read More ]

Mac’s Zoom Client Camera Bug Discovered, Patch Required

Since webcams came into existence the product came with a huge “if”. The possibility of some other people accesses the webcam online when they least expect it. Webcams exploded in popularity in the late ‘90s, primarily for use in conjunction with early instant messaging services such as Yahoo and ICQ. Today, webcams are highly integrated

[ Read More ]

RubyGems Strong_Password Lib Infiltrated By Hackers

The Ruby library is ubiquitous, it is everywhere, as proven by the number of loyal developers it attracted to the platform for decades. With the availability of its library for various operating systems, it is one of the most cross-compatible programming languages today which is highly underrated. However, recently, the use of Ruby needs to

[ Read More ]