‏Athena Martinez is a security expert/analyst geek with almost 5 years of experience, writes on various topics pertaining to internet security with latest happening in the IT world thoroughly.

How to Retrieve Malware Infected Joomla Website

If your website host or browser has blocked your Joomla! Website – it means that your website has malware. You must use this malware tool which is known as “remove a malware tool” to scan your website and get rid of the malware. While this warning confirms malware infection, there are a number of indicators

[ Read More ]

Emotet, LokiBot and Trickbot, Worst Malware To Watch-out For

High volume malware infections always claim the headlines, especially if they end-up operating in the same generation. Emotet, LokiBot, and TrickBot are the three strongest contenders as the malware to watch-out for this 2019, based on their infection campaigns from last year. Emotet is a multifunction malware, with it, the user’s credential can be stolen,

[ Read More ]

M-Trends 2019 Reports Shows “Persistence” Of The State-controlled Hacker Teams

FireEye, a mainstream cybersecurity consulting firm, has released their yearly M-Trends report, the 2019 edition features the malware trends for 2018 which will help shape the direction of the antivirus industry for the current year. If it can be summarized into just 1-word, that word is “persistence.” Threat actors, including that backed-up by nation-states, are

[ Read More ]

QBot Malware, Dozen Years Wreaking Havoc In the Wild

For decades now, security experts have advised the public never open attachments coming from emails from unverified sources. Unfortunately, this sane reminder has been ignored by many users as long as email systems first became a communication tool in the 1970s. Fast forward in this year 2019, malware infection due to opening attachments in emails

[ Read More ]

Winning Backup Formula: Mixed Traditional And Cloud Storage

IT security experts have been reminding everyone to “backup, backup, backup” for decades now, in fact since the introduction of peripheral storage devices such as the DVDs and USB flash drives. Backup systems are not products of rocket science, in fact, tape drives have been in the market since at least the 1960s. The high

[ Read More ]

Lack Of Policy Of Least Privilege Causes Cyber Attacks

The computer policy of the least privilege is not only an important principle but rather a critical piece of IT security precaution these days. Any organization should practice it, in order to lessen the possibility of unauthorized access or stolen account causing trouble for a system, especially in cloud-based apps and critical IT infrastructures. This

[ Read More ]

SHAREit App’s Vulnerability, Publicly Disclosed

It is very important security-wise that app updates be applied as soon as they become available, regardless of platform. Recently a critical vulnerability has been discovered in the popular cross-platform app, SHAREit. With a global user-base of around 1.5 billion users, and versions for MacOS, Windows, iOS, and Android, a flaw in the app affects

[ Read More ]

4 Ways To Address Cybersecurity Gaps For An SME

Multinational and large enterprises have no trouble with beefing-up their cybersecurity defense as those organizations have deep pockets, and a bad incident of a cyber attack can overnight cripple their business and their brands. Unfortunately, in the global scale, it is the SME’s (Small and Medium Enterprises) that employs the majority of the working population.

[ Read More ]

DDoS-For-Hire Suspect in Chicago, Pleaded Guilty

Threat actors, for all intents and purposes, are wise individuals. They have advanced minds and they always try to be a step ahead when it comes to covering their tracks before authorities and investigators complete the puzzle. Unfortunately, for some of them, they have not yet reached the art of cover-up as they leave their

[ Read More ]

Hackers Now Target Porn Site Users to Steal Their Credentials

Hackers now target porn website users, especially PornHub and XNXX users accounts and get away with their login credentials. This kind of hacking, as per security experts, has nothing strange about it. Pornography, despite many ongoing campaigns to decrease online pornographic content and traffic, remains one of the most popular and sought-after kinds of online

[ Read More ]