‏Athena Martinez is a security expert/analyst geek with almost 5 years of experience, writes on various topics pertaining to internet security with latest happening in the IT world thoroughly.

Major IT Issues: Threats Posed By Mobile Fraud & Account Theft

Smartphones and other mobile devices such as tablets and smartwatches are fast becoming more “personal computers” than the PC. People interact with these devices and store more personally identifiable information in them more than any laptop or desktop computer. In today’s technology-driven world, even the first thing to do after waking-up is checking the notification

[ Read More ]

Beapy Cryptojacking Malware: The Return Of Eternal Blue Exploit

The Eternal Blue exploit, the infamous Windows bug that the U.S. National Security Agency weaponized and was eventually leaked by the Shadow Brokers hacking group, which was then later used for the successful WannaCry ransomware campaign in 2017 is re-emerging. WannaCry launched ransomware into public prominence and even made an estimated $4 billion profit for

[ Read More ]

What Went Wrong: The 2019 Humble Bundle Security Breach Case

Humble Bundle, the digital storefront for video games is a blessing for indie game developers for at least 8 years now. The company which now operates as a subsidiary of Ziff Davis since October 2017, has been a strong force of distributing indie game titles that will otherwise are not visible to a typical gamer.

[ Read More ]

The Basics Of Choosing The Best Webhosting Service

How to choose a web hosting plan: Various vendors offer webhosting service, but how should people choose which server to use? The point is the balance between cost and functionality. The cost of the webhosting server can vary considerably from a few dollars to several thousand dollars or more a month. What is the difference

[ Read More ]

2019 In-Review: The Cybersecurity Risks Involving Schools Are Real

Educational institutions are where we shape our knowledge in preparation for our adulthood. For every field of study, time needs to be spent in a curriculum designed in order to maximize learning opportunities, or that should be the case. In the field of IT, especially in cybersecurity, no school or a University can claim that

[ Read More ]

Espionage Malware Karkoff Campaign Revealed

Cisco Talos has revealed in a report that the new campaign initiated by a group of hackers responsible for DNSpionage earlier that uses malware to infiltrate target firms. The malware has the capability to use both regular http and dns-based communication to its command and control servers, moving data stolen from computers to the custody

[ Read More ]

Some of the Worst Passwords of 2019

Cybersecurity experts always advocate for a strong and unique password, and it is one of their top priority. They also continually identify the different patterns that make a strong, unique password. However, not many take this recommendation seriously, because they think it is difficult to remember or they are not able to come up with

[ Read More ]

Bodybuilding.com Data Breach, A Year After A Phishing Attack

There are times, that the bad effects of a phishing attack are not immediately felt. The phishers usually run many parallel campaigns all at the same time, and due to volume may take a while for them to “schedule” a “follow-up” attack against a target after a successful phishing expedition. This what happened when bodybuilding.com,

[ Read More ]

jQuery JavaScript Library, Target Of Pollution Attacks

We can safely say that the Internet and the World Wide Web today will not be possible without the use of a scripting language that most people often overlook, Javascript. Whether we like it or not, JavaScript made the web as interactive, usable and convenient to use, in fact disabling scripting will break the functionality

[ Read More ]

Is China Racial-Profiling Its Minority?

Mainland China has already started its massive facial database of all mainland Chinese citizens and possibly permanent residents of the country as well. Beijing is keen on monitoring the movements of people in the mainland. This is the key to transform China into a cohesive unit, with the opposition to the ruling leaders in Beijing

[ Read More ]