‏Athena Martinez is a security expert/analyst geek with almost 5 years of experience, writes on various topics pertaining to internet security with latest happening in the IT world thoroughly.

Minnesota’s Department of Human Service, Latest Victim Of Phishing

Minnesota’s Department of Human Services (DHS) headed by its Commissioner Tony Lourey has issued a document to both houses of Congress detailing its data breach happened with the department affecting 11,000 people. It only took the hackers to persuade a DHS employee in opening an “invoice” email, and the department normally receives 92,500 phishing/spam emails

[ Read More ]

Triton Hacker Group Attacks Saudi Petrochemical Company Again

FireEye, a mainstream cybersecurity consulting firm has recently exposed that a state-funded malware development group was behind an attempt to blow a Saudi-based Petrochemical facility using malware a second time. Called the “Triton” group, they have developed the eponymous malware, it takes control of machinery in order to overwork itself with the chance of eventual

[ Read More ]

Firm’s Convenience VS Security, A Free Choice

As we have emphasized in this website many times in the past, security and convenience are two opposing principles when it comes to the digital lifestyle of an individual or a business entity. Each time convenience becomes the focus for an entity, the natural side-effect of a wider attack surface is the result. The measure

[ Read More ]

7 Easy Steps To Secure Your Drupal Website

Let’s hope that all the Drupal website is updated and patched, and in that case, all the critical security flaw, Drupalgeddon2, is not likely to return. Even so, with the craze of cryptocurrency mining attack still lurking around the unpatched websites, here is a quick way to secure Drupal? Here is a list of 7 basic steps

[ Read More ]

Is Infrastructure-As-A-Service The Future Of Corporate Computing?

Ask any system administrator today, and we will hear from them that attempts from unknown outside parties infiltrating their systems are happening on a daily basis. Yes, guys welcome to the 21st-century corporate computing era. We live in a world where cyber warfare is raging globally, between nations, between firms and between groups and individuals.

[ Read More ]

VPN Apps Not Working As Intended, Exposed

As an IT professional for decades, we are always highlighting the importance of VPN when it comes to maintaining security and privacy. It is the most cost-effective way to isolate a connection from prying eyes, a VPN creates a secure virtual pipe from the user’s origin device to the VPN vendor’s exit node, wherever it

[ Read More ]

Hackers Can Use Unused Internet Explorer to Steal Data

This is no less than a shocker…Hackers can now use Internet Explorer to steal your data, that too even if you never use it. A security researcher has detected a zero-day vulnerability in Internet Explorer which would allow hackers to steal data. Security researcher John Page has published details and proof-of-concept code for the zero-day

[ Read More ]

A Quick Glimpse Of Hong Kong’s Cybersecurity Readiness

The Hong Kong Special Administrative Region has governed under a One-China, Two-systems policy since 1997. That means the great firewall of China which is enforced in the mainland is not applied in Hong Kong. It decides on its own about its internal policies when it comes to governance, including the responsibility of making sure that

[ Read More ]

Two UK Agencies Commit Accidental Contact Information Leaks

The United Kingdom is currently processing its Brexit documents to complete the process of leaving the European Union for good. But it is now at the very center of another controversy as 240 EU-member state nationals applying for EU settlement scheme program had their email addresses leaked from the UK Home Office due to an

[ Read More ]

Android Phone as Physical Security Key for Google Accounts

Great news indeed! Google has come up with a new advanced two-factor authentication method that would help you secure your Google accounts using your Android phone as a physical security key. This new advanced two-factor authentication method secures Google accounts when users log in using the Chrome browser. This service can be used on Android

[ Read More ]