‏Athena Martinez is a security expert/analyst geek with almost 5 years of experience, writes on various topics pertaining to internet security with latest happening in the IT world thoroughly.

Australia VS Huawei Devices Storyline Never Die

The political propaganda against Huawei devices continues in the land down under, as the Australian Foreign Minister Marise Payne has ruled that the ban against Huawei’s 5G devices will continue to be implemented by the federal government. “We have taken the strongest advice from intelligence agencies in this country, the strongest technical advice as to

[ Read More ]

Streaming Music Service Competition To Intensify In India

Streaming services market is already saturated in western countries like the United States and the United Kingdom, the rest of North America and Europe. The only way for services such as Spotify and Youtube Music to expand is by entering new markets, especially in areas of emerging nations. That could be China, if not due

[ Read More ]

Google Service Downtime? Check Google Service Status Portal

Google services has become very influential for two decades now, to a point that the world is heavily depending on it for everyday stuff. Services like email, videos, messaging, authentication across many web services and etc are highly dependent on Google working as it should. We can safely say that a downtime of a Google

[ Read More ]

Mimikatz: A Deeper Look At Blackhat And Whitehat Hackers’ Shared Tool

There is a thin line that separates black hat hackers (malicious hackers) and white hat hackers (ethical hackers), both possess skills that can harm networks, systems, and computers if they wish to do so. The good thing is ethical hackers helps lessen the chances that blackhat hackers become successful with their campaigns. They do this

[ Read More ]

The Cybersecurity Risks Of Engaging With Cryptocurrency

Cryptocurrency and the rise crypto-economy have become all the rage in the last 5 years, especially those speculators that are in it for one-time, big-time possibilities. People who even lack enough knowledge about the technology jumped into the bandwagon, and the .com bubble of the late 90s and early 2000s made a repeat. Cryptocurrency exchanges

[ Read More ]

Malware In ThePirateBay? A Surprise Or Nothing New?

ThePirateBay has been existing for at least two decades now, migrating from one domain extension to the next during its history since September 2003. Marketed itself as an online index of all media, regardless of their copyright protection, the site grew to 35 languages through the years. It is considered the biggest content hosting site,

[ Read More ]

CISO’s Role For Cybersecurity Readiness, Highlighted By Cisco

We are in the paradigm shift when the majority of companies, slowly but surely embracing cloud computing and cloud apps platforms. Cisco’s CISO Benchmark Study 2019 is a global survey participated and represented by 18 countries with 3,200 participants, majority of whom are leaders in the IT field, across many industries from SMEs to multinational

[ Read More ]

Restaurants & Food Businesses, New Hacking Targets?

Restaurants, food, and beverage companies are not usual targets of cyber attacks, malware infection, ransomware infestation, and data breach attempts. However, a paradigm shift is currently happening, when threat actors are looking for new victims, new industries to focus on when it comes to their campaigns. The key ingredient of becoming an attractive potential victim

[ Read More ]

Legacy Systems And Cybersecurity, A Difficult Reality

Maintenance and continued use of legacy systems by many corporate entities today make the goal of cybersecurity for the world today a tall order. As organizations are transitioning to new systems, the old systems remain running in order to maintain their clients under their current business model. Of course, the reliability of the old system

[ Read More ]

The “Spoiler” Processor Bug: Is Intel In Trouble Again In 2019?

2018 was a very bad year for microprocessor vendors due to the Spectre and Meltdown bug, but for Intel, it was a nightmare year, worst in its history. The out-of-order execution and branch prediction capabilities of processors were developed in a way that allows timing attacks, which made Spectre and Meltdown take the cybersecurity headlines

[ Read More ]