‏Athena Martinez is a security expert/analyst geek with almost 5 years of experience, writes on various topics pertaining to internet security with latest happening in the IT world thoroughly.

Two UK Agencies Commit Accidental Contact Information Leaks

The United Kingdom is currently processing its Brexit documents to complete the process of leaving the European Union for good. But it is now at the very center of another controversy as 240 EU-member state nationals applying for EU settlement scheme program had their email addresses leaked from the UK Home Office due to an

[ Read More ]

Android Phone as Physical Security Key for Google Accounts

Great news indeed! Google has come up with a new advanced two-factor authentication method that would help you secure your Google accounts using your Android phone as a physical security key. This new advanced two-factor authentication method secures Google accounts when users log in using the Chrome browser. This service can be used on Android

[ Read More ]

The State Of BayState Health Data Breach

A huge phishing campaign has brought Baystate Health to losing an estimated 12,000 individual patient record, the Massachusetts-based healthcare provider disclosed. The affected information that was breached includes full name, birthdate, medical record, diagnostic record, health insurance details, and social security numbers. The records were breached from the period of February to March 2019, and

[ Read More ]

4 Simple Actions To Fight PC Infections

In today’s cybersecurity atmosphere, there is no way for any organization to assume that “we are not hacked”. The attack surface is very wide in Windows, Office, Java, Flash Player, and even the Intel processors have hardware security bugs. Basically, 2018 was a horrible year for cybersecurity because it proved how indefensible is the architecture

[ Read More ]

Top 10 Misconceptions In Cybersecurity

Cybersecurity is a big word that is being used by IT professionals and the mainstream media nowadays, unfortunately, the latter still lack understanding on how to explain it to common people. There is a gap between how the cybersecurity vendor markets their products and services vs how the mainstream media handle the reports as if

[ Read More ]

Android Q’s Deep Press, an iPhone 3d Touch Clone

We are in the day and age that both Android and iOS are both copying each other’s features, which is not a big deal given how both platforms are already in their maturity stage. Google has decided to silently implement a feature that resembles 3d touch in iPhones, they call it the “Deep Press”, which

[ Read More ]

Why Are Web Hosting Servers Often Planted With Malware?

Ten nasty malware are currently having a field day infecting and using 10 corporate-level web hosting servers for further malware deployment to site visitors. The campaign which saw the progressive growth of Azorult, Gandcrab, Neutrino, Hermes, IcedID, Trickbot, Nymaim, Gootkit and Dridex in these 10 servers were linked to the Necurs botnet. It is a

[ Read More ]

Apache Critical Vulnerability Discovered, Update Available For Download

Apache, the top web server platform the Internet as a critical vulnerability which is recently patched by Apache Foundation. Everyone that Apache needs to immediately install the patched version of Apache in order to close the vulnerability which is now known as CVE-2019-0211. As per the report affected versions range from 2.4.17 to 2.4.38, the

[ Read More ]

Xwo Malware, A Powerful Cyber Espionage Tool

Xwo, a newly revealed web service vulnerability scanning malware discovered by Alien Labs, a subsidiary of AT&T, was named after the very dropper which serves as it propagating module with a file named xwo.exe. Unlike a typical ransomware that immediately issues an encryption process against the user files, Xwo was more of a monitoring-type kind

[ Read More ]

4 Ways To Keep Your Mobile Device Secure

How to Secure Your Mobile Device? Mobile devices outnumbered laptops and desktops in use today, that is why it is very important for everyone to treat them with utmost care, and a reasonable level of skepticism when using it for online transactions. The smartphone is the most personal computer of all personal computer, it is

[ Read More ]