‏Athena Martinez is a security expert/analyst geek with almost 5 years of experience, writes on various topics pertaining to internet security with latest happening in the IT world thoroughly.

Firefox 67 Returns Mozilla Browser’s Dependability

Web browsers are our window to the world, the Internet where all the current cybersecurity risks come from. Hence, all browser vendors are hard at work with fine-tuning their products in order to win the trust of users. Mozilla is trying to recover from their recent Add-on fiasco with the fixed Firefox 66.0.4, and hot

[ Read More ]

Era of Anonymous Mobile Browsing? TOR Browser Arrives To Android

We are recommending the use of the TOR Browser when it comes to browsing the web anonymously, with the bonus of enabling the user’s capability to browse the Dark Web with confidence. TOR, an acronym for The Onion Router, is a system of browsing the web through multiple nodes, to a point where the user’s

[ Read More ]

Why Windows Update Is Very Critical These Days?

Unless you are living under-the-rock for the past week or two, nobody in the tech world who does not know about the cpu.fail bug, the microprocessor flaws that were revealed by the same group of researchers who discovered last year’s Spectre and Meltdown exploits. The operating system is the interface that serves as the middleman

[ Read More ]

How Companies Can Mitigate Supply-Chain Attacks?

The supply chain attack that is becoming a problem today refers mainly to the method of embedding malware and backdoor in the product itself, update programs, patch modules, etc., in light of the vulnerability of the software product supply chain. A legitimate software developer will not deliberately insert those features to the products they offer

[ Read More ]

Microsoft Reminds User To Update The Legacy Operating Systems

Microsoft released a patch for a handful of legacy operating systems that are no longer available after detecting a critical vulnerability. The company warns users to quickly patch their systems to prevent another WannaCry ransomware attack. It is “highly likely” that malicious actors will write an exploit for this vulnerability, Simon Pope, director of incident

[ Read More ]

Google Tracks Your Online Purchases

Last week, Google CEO Sundar Pichai wrote an editorial in “The New York Times that reads “Privacy cannot be a luxury good.” But behind the scenes, Google has collected more personal information from the services you use, such as Gmail, and some of them cannot be easily deleted. A page called “Shopping” shows a detailed

[ Read More ]

2.25 Million Russian Passport Entries, Leaked To The Internet

Russians are alerted as around 2.25 million passport entries from 360,000+ individual passport holders were leaked from multiple Russian-state controlled websites, including the data from high officials of Kremlin. Information stolen is now available for download online by anybody using simple keywords, with information of high-level officials of Russian included in the leak including former

[ Read More ]

Simple Comparison Of Mac vs Windows Hardware

In practice, operability is not so different between Windows 10 and Mac. It may be a big difference from the designers and programmers’ point-of-view, but most of it is just aesthetics. You can change the default setting in the UEFI (Unified Extensible Firmware Interface) page and both operating systems will take note of the hardware

[ Read More ]

Why Google’s Titan Security Keys Is Now Insecure?

We came to a full circle, as the Google who first touted their Titan Security Keys as the secret ingredient why the search giant employees never fell to phishing, is now very much vulnerable to hijacking, at least with its BLE (Bluetooth Low Energy) version. Google was selling their Titan Security Keys, but the search

[ Read More ]

Paterson Public Schools In Deep Trouble After A Massive Data Breach

Aside from the Healthcare Industry that focuses its funding towards its hospital services to the patients, public schools also do the same – the focus is their interest in educating young people. The idea of having a cyber attack-ready computing infrastructure is not even on the radar, as it is not part of the funding

[ Read More ]