‏Athena Martinez is a security expert/analyst geek with almost 5 years of experience, writes on various topics pertaining to internet security with latest happening in the IT world thoroughly.

Android Q’s Deep Press, an iPhone 3d Touch Clone

We are in the day and age that both Android and iOS are both copying each other’s features, which is not a big deal given how both platforms are already in their maturity stage. Google has decided to silently implement a feature that resembles 3d touch in iPhones, they call it the “Deep Press”, which

[ Read More ]

Why Are Web Hosting Servers Often Planted With Malware?

Ten nasty malware are currently having a field day infecting and using 10 corporate-level web hosting servers for further malware deployment to site visitors. The campaign which saw the progressive growth of Azorult, Gandcrab, Neutrino, Hermes, IcedID, Trickbot, Nymaim, Gootkit and Dridex in these 10 servers were linked to the Necurs botnet. It is a

[ Read More ]

Apache Critical Vulnerability Discovered, Update Available For Download

Apache, the top web server platform the Internet as a critical vulnerability which is recently patched by Apache Foundation. Everyone that Apache needs to immediately install the patched version of Apache in order to close the vulnerability which is now known as CVE-2019-0211. As per the report affected versions range from 2.4.17 to 2.4.38, the

[ Read More ]

Xwo Malware, A Powerful Cyber Espionage Tool

Xwo, a newly revealed web service vulnerability scanning malware discovered by Alien Labs, a subsidiary of AT&T, was named after the very dropper which serves as it propagating module with a file named xwo.exe. Unlike a typical ransomware that immediately issues an encryption process against the user files, Xwo was more of a monitoring-type kind

[ Read More ]

4 Ways To Keep Your Mobile Device Secure

How to Secure Your Mobile Device? Mobile devices outnumbered laptops and desktops in use today, that is why it is very important for everyone to treat them with utmost care, and a reasonable level of skepticism when using it for online transactions. The smartphone is the most personal computer of all personal computer, it is

[ Read More ]

Cyberattacks Against IoT Devices on the Rise

Cyber attacks targeting IoT (Internet-of-Things) devices are rapidly increasing, as more people and organizations deploy them. IoT devices that are connected to the Internet but do not have a password set, or are often operated with the initial settings, are likely candidates to be targeted next. Various incidents have already occurred, some of which were

[ Read More ]

Ransomware In The Nutshell: What is Ransomware?

In this article, we give you a brief review of what is ransomware, the headache of all system administrators and people who work in IT support for years. Ransomware is a favorite cash cow of cyber criminals (aside from phishing), as reflected by how WannaCry, world-infamous ransomware which earned $4 billion for its authors. As

[ Read More ]

Top-Level Committee Formed To Combat Cybercrime In Singapore

In our continued coverage of Singapore’s Cybersecurity status, a national committee composed of top-ranking ministers partnered with captains of Singapore’s IT industry are set to review the city-state’s current data security policies. The city-state made its decision to form a super committee which will be headed by the Deputy Prime Minister, Teo Chee Hean, he

[ Read More ]

North-Korean Hacking Group, Lazarus, Sets Its Sight Against Singapore

Having the biggest economy in Southeast Asia, Singapore has become a favorite target when it comes to cybercrimes and data breaches. In the Money20/20, an annual event held focusing on financial technologies and financial services, the agenda of cybercrime prevention was highlighted. Threat Intelligence firm, Group-IB emphasized in the summit the exposure Singapore banks are

[ Read More ]

The Tale Of Fake Microsoft Tech Support Scheme

A man named Bishap Mittal from North Carolina who apparently operated a “tech support” scheme for four years pleaded guilty for the case of Conspiracy to Access A Protected Computer. This was due to a scamming scheme he perpetuated by his company, Capstone Technologies LLC with an unnamed business partner. The company’s business model is

[ Read More ]