‏Athena Martinez is a security expert/analyst geek with almost 5 years of experience, writes on various topics pertaining to internet security with latest happening in the IT world thoroughly.

The Growth Of Netherland’s Anti-Microsoft Telemetry Stance

Microsoft has found a new foe in its Windows-Office empire, as the Netherland’s Ministry of Justice and Security issued a stern warning Dutch public sector users of Office mobile, Office online and the enterprise version of Windows 10 about privacy risks. The ministry based its findings to the Data Protection Impact Assessment report made by

[ Read More ]

Four Fundamental Network Security Tips But Often Ignored

We cannot make someone reads our article to become a CCNA-level network administrator anytime soon. Networking is hard, with various protocols, wiring standards and other critical parts that need to work hand-in-hand to even enable a transfer of PING packets. Take a look at the basics of the seven layers of the OSI model, to

[ Read More ]

Android Security Out Of Google’s Control, Malware Infections Persists

“Security patch” is a term that refers to programs and data that fix known vulnerability in the software. Vulnerabilities are weaknesses, software bugs which can be “weaponized” in order to compromise the security and privacy of users. How many times we have witnessed in the mobile space, more particularly on Android having many unpatched defects,

[ Read More ]

IoT Suppliers From China, Should We Trust Them?

Internet-of-Things is one of our most favorite, if not the most favorite topic to discuss here. We wrote countless articles since 2017, about the inherent increase of acceptance of IoT devices, the security risks they add to the homes and offices, and the real cost of its operations overall. However, we have not tackled the

[ Read More ]

250GB Stolen Data From Brazillan Bank

Brazillian bank named Banco Pan is at the center of the biggest controversy of its history when it was involved with the release of 250GB worth of their customers’ data to the public. The unprotected server in question is not yet identified at the time of this writing, but it hosts data not only for

[ Read More ]

Mitrecorp Issues Fake Vulnerability Bug Report For VLC Player

CERT-Bund has issued a critical advisory regarding an alleged persistent vulnerability in all versions of VLC Player from version 3.0.7.1 and older. VLC Player is a very popular cross platform open source media player with versions available in Windows, Linux, MacOS, iOS, Android and Unix. The bug has something to do with buffer over-read, connected

[ Read More ]

Trust Issues In Believing Phishing, The Biggest Risk In Education Institutions

Fake invoices are easier to detect if these piggyback emails that came from people you don’t know. We are well aware of the messages from complete strangers may range from complete irrelevant to dangerous as it harbors malware, placing the victim into cybersecurity trouble. Even phishers and cybercriminals know that basic principle of safe computing,

[ Read More ]

Why Small Cities Are Attractive For Ransomware Authors?

It is becoming fairly common that small city or municipalities are the most profitable victims of cyber threats and cyber attacks using their ransomware campaigns. Here, we have featured at least two cities that were victims of ransomware infection, Riviera City (Florida) and Baltimore (Maryland). The city councils of both cities decided to pay the

[ Read More ]

Comprehensive Cybersecurity Plan, A Must For Firms

Cyber ​​attacks are changing with the times. Initially, personal cyber-attacks were nothing but digital vandalism, seeking for 15-minutes of fame were mainstream, but the people behind the attacks today shifted to economic reason why they are into it – for money. They target organizations, important infrastructures, and state agencies, the incidents became increasingly sophisticated, complicated

[ Read More ]

Current 5G Situation vs “Legacy” 4G, Is AI Extension Necessary?

5G is being developed so that different requirements such as “high-speed, large-capacity data communication”, “connection of many terminals”, and “ultra-low latency and ultra-reliability” can all be satisfied with one network platform. However, in actual use situations, networks can be virtually separated and provided depending on the purpose of each use. This technology is called “network

[ Read More ]