‏Athena Martinez is a security expert/analyst geek with almost 5 years of experience, writes on various topics pertaining to internet security with latest happening in the IT world thoroughly.

Simple Comparison Of Mac vs Windows Hardware

In practice, operability is not so different between Windows 10 and Mac. It may be a big difference from the designers and programmers’ point-of-view, but most of it is just aesthetics. You can change the default setting in the UEFI (Unified Extensible Firmware Interface) page and both operating systems will take note of the hardware

[ Read More ]

Why Google’s Titan Security Keys Is Now Insecure?

We came to a full circle, as the Google who first touted their Titan Security Keys as the secret ingredient why the search giant employees never fell to phishing, is now very much vulnerable to hijacking, at least with its BLE (Bluetooth Low Energy) version. Google was selling their Titan Security Keys, but the search

[ Read More ]

Paterson Public Schools In Deep Trouble After A Massive Data Breach

Aside from the Healthcare Industry that focuses its funding towards its hospital services to the patients, public schools also do the same – the focus is their interest in educating young people. The idea of having a cyber attack-ready computing infrastructure is not even on the radar, as it is not part of the funding

[ Read More ]

14 Clever Ways To Secure User Login Credentials

The Tech industry has slowly but surely trying to provide the masses a new way to authenticate themselves to web services. New technology as the Windows Hello built-in to all Windows 10 computers with a webcam and SQRL, a QR code-based login system are currently being polished in order to provide users a convenient alternative

[ Read More ]

6 Members Sim Hijacking Team “The Community” Indicted by DOJ

The U.S. Department of Justice has indicted six people allegedly linked with the “The Community” cybercrime group for an alleged SIM card hijacking case which made victims lose an aggregate $2.4 million. The DOJ has posted the announcement in its official Press Release, the six individuals named below are facing multiple cases of aggravated identity

[ Read More ]

How Useful Artificial Intelligence for Operations Will Be?

A huge portion of the typical labor force today will be replaced by artificial intelligence. It is not a question of if, but of when, by that time people needs to see new possibilities to focus on such as creative work, the arts and other aspect of human interest that AI will never able to

[ Read More ]

Wyzant Online Tutoring Service, A Major Victim Of Data Breach

Wyzant, a mainstream online tutoring service has suffered a major system breach. More damage falls on their customers that use their personal Facebook login for their Wyzant service, as their Facebook information could have been part of the stolen information as well. Wyzant admins detected an abnormal activity in their database last May 2, 2019.

[ Read More ]

5 Ways In Handling Security Trends of First Quarter 2019

2019’s First Quarter already ended, and as we can see cybersecurity issues are not bound to slow down any time soon. We have provided many embarrassing and sad stories of companies and public sector entities falling for cyber attacks, phishing, malware infection and other issues. We are here to help make our readers aware of

[ Read More ]

The Fundamentals of Drones And Its Security

Drone is a common name for UAV: ​​Unmanned Aerial Vehicles, there is also a type of drone on each of the land, sea, and air, which are called UAV, UGV, and UMV, respectively. The current drone for civilian and military use can fly autonomously by GPS and inertial navigation system. What is confusing is that

[ Read More ]

Norsk Hydro’s Damage Control Efforts After Ransomware Attack

Norsk Hydro, a metal, and renewable energy conglomerate company in Oslo Norway is trying to recover from the cost of the LockerGoga ransomware attack it absorbed last March 2019. As the company computes for its loses, LockerGoga continues to ask for ransom payment for the decryption key needed to restore the locked files to its

[ Read More ]