‏Athena Martinez is a security expert/analyst geek with almost 5 years of experience, writes on various topics pertaining to internet security with latest happening in the IT world thoroughly.

6 Easy Tips for Ensuring Better Data Security in 2019

Cyberattacks would definitely continue to hit businesses in 2019 too. Cyberattacks, which cost businesses thousands of dollars, could shatter many businesses totally. In the present context, attacks against small businesses are on the rise. Data security should be one of the top priorities for any business today. Here’s a look at how to increase data

[ Read More ]

Better IT Security with AI

Today IT security teams are finding it hard to figure out what is an actual threat and what isn’t. The complex network environments have massive data coming in, IT and Artificial intelligence (AI) will help ally to find genuine risk in the midst of all the data if applied correctly. People do things with their

[ Read More ]

Data Breach Hits Malaysian University, Personal Data Leaked

A massive data breach that had reportedly hit a prominent Malaysian university has resulted in personal data of over one million people being leaked online. As per reports, personal details of over one million students and alumni of the UiTM Universiti Teknologi Mara have been breached and leaked online. This breach has reportedly occurred between

[ Read More ]

Discussing Enterprise Search Trends for 2019

There is a sea change that’s visible in enterprise search trends in recent times. AI (Artificial Intelligence), just as it has impacted other areas of the enterprise work environment (in addition to impacting our individual lives in a notable manner), has influenced this area as well. Consumer internet search is now becoming more personalized and

[ Read More ]

SMS Phishing Attempts Against DBS Customers Rampant In the Wild

Development Bank of Singapore and the Singapore Police have issued a warning to the public that a specifically crafted phishing SMS message are spreading, providing users a link that will steal their username and passwords for their DBS online account. Sample messages below: DBS instructed their customers never fall for such scams, especially those messages

[ Read More ]

Securing IoT Devices against Increasing Cyber Threats

Artificial intelligence (AI), and most people must have heard about it. AI enables people to have a great online experience, and it is the engine behind cyber technology. Delivering automated services, and more personalized engagement with brands and providers. It also protects people online, detecting threats in real time and preventing cyber attacks. AI is

[ Read More ]

Newly Released ATLAS MMORPG, Newest Victim of “PewDiePie” Meme Attacks

Playing an online game is one of the most relaxing activity a person can engage without leaving the conveniences of one’s home. Unfortunately, this may not always the case these days, as the game can experience cybersecurity issue as well just like any computer system. This scenario happened recently with ATLAS, the newly released Massively

[ Read More ]

Ransomware Prevention Tips for the Healthcare Industry

When the WannaCry ransomware struck around mid-2017, one of the organizations most impacted was the NHS (National Health Service) in the UK. Service was affected adversely in hundreds of NHS facilities; thousands of appointments had to be canceled, operations had to be postponed and patients had to be urgently relocated from many emergency centers were

[ Read More ]

Implementing Artificial Intelligence into Businesses

Artificial Intelligence (AI) has definitely gone mainstream; it has made its presence felt in smartphones, smart homes and a wide range of computer/internet solutions. Thus, it becomes only natural that businesses seek to be part of the AI race and endeavor to make the most of the technology. So, how to implement AI into your

[ Read More ]

What Is Brute force And Dictionary Attacks?

Brute force attack means a repeated login attempt by criminals using every possible method like; letter, characters, number, and other combinations to guess a password. The attacker uses this technique to get one of the three things: an administrator password, a password hash key, or an encryption key. Getting a short password can be easy

[ Read More ]