‏Athena Martinez is a security expert/analyst geek with almost 5 years of experience, writes on various topics pertaining to internet security with latest happening in the IT world thoroughly.

Attempted Cyber Attack on Australian Parliament

Australia’s security agencies are investigating a likely cyber-attack attempt on the Federal Parliament’s computer system. It is alleged that the government believes that some foreign government is behind the attack. The hackers were caught in the early stages of gaining access to the system because the authorities didn’t find any loss of data, but signs

[ Read More ]

Increased Security Risks in the Era of Digital Transformation

The new digital transformation era seems to be an era of increased security risks as well. The new era of digital transformation, in which organizations all the world over seek to embrace new technologies, is also an era in which organizations are struggling to implement and attain proper data security. This is what a new

[ Read More ]

GDPR Compliance: Things that Companies Tend to Overlook

The GDPR (General Data Protection Regulation), which is the European Union’s new privacy regulation, came into effect in May 2018. The compliance rules of the GDPR, though they seem to be simple, do have some minor complications and hence companies that seek to comply with the regulation should see to it that they don’t overlook

[ Read More ]

Cyber Security Is A Culture That Needs To Be Practiced

The biggest weakness of security breaches are the people, but at the same time, they can also be your organization’s biggest defence. The massive telecom data breach, stolen credentials, data compromised are some of the daily issues that we see these days. All of these major breaches resulted from mistakes of individuals. Despite years of

[ Read More ]

Design Website Houzz Caught In Data Breach

Home improvement and design website Houzz has publicly disclosed that an unauthorized third party had obtained a file containing user data. This looks like the data breach was discovered late last year. According to a report in scmagazine, the FAQ page published on Houzz.com today says that the compromised information falls under three categories: •

[ Read More ]

Japan Set to Survey 200 Million Gadgets for Cybersecurity

Japan is all set to beef up cybersecurity as the country gears up to host some notable global events. As Japan gets ready to host events like the Rugby World Cup, the Group of 20 meetings and the Summer Olympic Games, Tokyo decides to survey 200 million network-connected gadgets for cybersecurity lapses. The survey starts

[ Read More ]

Android Malware That Triggers Only When It Detects Motion

This is a rather different piece of news- an Android malware that triggers only when it detects some motion has been detected. Malware authors think of all kinds of ways in which they could prevent their malware from being detected by security companies and security software. Hence, over the years, they have been creating viruses,

[ Read More ]

Man-In-The-Middle 3rd Party App, To Be Filtered By Firefox 66

Having installed antivirus software both became a blessing and a curse for any computer user. It used to be all beneficial as antimalware software manages to detect suspicious behaviors in Windows before the damage is done. However, this capability of antimalware software has its corresponding limitations like damaging the actual Windows files that prevent the

[ Read More ]

Steps to Prevent Data Breaches Quickly

Normally, it takes around 6-months for an organization to realize that their system is infected with malware or data breach. This is a good time for the hackers to play around and get the maximum out of it. So it is quite obvious that the organization will not have enough time in hand to mitigate

[ Read More ]

Malware That Can Pull To Pieces Cloud Security Protections

A new kind of malware has been identified that can remove cloud security products. In a report released on Thursday by researchers from Palo Alto Networks’ Unit 42 said that “the malware samples they obtained, which are used by a hacking group known as “Rocke,” showed that they can dismantle security products from compromised Linux

[ Read More ]