‏Athena Martinez is a security expert/analyst geek with almost 5 years of experience, writes on various topics pertaining to internet security with latest happening in the IT world thoroughly.

Ethical Hackers: The Unsung Heroes Of Cryptocurrencies

Cryptocurrency is becoming a revolution, not only because of the support of enthusiasts and individuals who love the principle of having a monetary instrument free from government control. It is also due to the hard work and dedication of its unsung heroes, the ethical hackers who continue to hunt for bugs in the code that

[ Read More ]

Are Cybersecurity Issues Rampant Or Firms Are Just Lazy?

For years, we broke news about various organizations becoming victims of data breaches, cyber attacks, spear phishing, and other cyber crimes. We feel sorry for these firms, as nobody deserves to be in a very humiliating and financially stressing situation such as becoming a victim of cybercrime. Today, it is fairly normal to hear this

[ Read More ]

Encryption Is Also A Hackers’ Weapon

Encryption has become a staple on how we keep ourselves secure and privately online, especially with our financial transactions today. What is not given much coverage is the fact that the same technology that safeguards our data and keeps ourselves private is accessible as well by the cybercriminals beyond ransomware. The media hyped the spread

[ Read More ]

5 Likely Cybersecurity Trends For The Rest Of 2019

What are we expecting from the world of cybersecurity, as we enter its second quarter of 2019? In order to predict whatever theoretical or reasonable trajectory that we will experience for the rest of the year, let us review happened in 2018 and discuss the trend of 2018 as a guide for this year based

[ Read More ]

Know More About The Bitcoin Core Fake Wallet

As Bitcoin matures and other cryptocurrency alternatives emerge, the growth of interest with cryptocurrency wallet and cryptocurrency node also comes into effect. At the time of this writing, 1 BTC is around $3,960, though huge for an average Joe, it used to be as high $19,783.21 on Dec 17, 2017. Bitcoin Core, the free software bitcoin

[ Read More ]

LokiBot, The Android Malware Problem Since 2016

LokiBot is silently causing harm to Android devices that it has infected without user knowledge since 2016. It is a trojan designed to steal information from the user, an espionage-like software causing users to lose their login credentials for various web services. The people behind it are very motivated, given that they continue to “improve”

[ Read More ]

The Corporate Risks Of Allowing Undocumented Devices

Accessibility and commoditization of computing devices brought both advantages and disadvantages for the public. The smart devices became much more affordable, while manufacturers are motivated to release new devices faster than the market can actually afford. Enterprises are very much affected by these dynamics, given that they have allowed BYOD (Bring Your Own Devices) within

[ Read More ]

BTC vs BCH or BSV, Which Is The Best Successor To Bitcoin?

Bitcoin (BTC) has been with us since January 3, 2019, and since then the blockchain cryptocurrency that started the craze has become a very difficult mine. Those that came early to support BTC is slowly but surely migrating to other cryptocurrency. One of them is Kevin Pham, a long time voice in the promotion of

[ Read More ]

Hacking Preventive Ways To Keep Gnosticplayers at Bay

Hackergroup Gnosticplayers had done it again, their recent successful campaigns against 8 websites, namely: Strong Kingdoms, petflow, YouNow, Houzz, Roll20, ixigo, and Ge.tt. These attacks created a huge supply of user credentials that are now available for sale in the Dark Web. At a recent estimate, around 126 million accounts are being offered to Dark

[ Read More ]

Yuki-Chan Automated Pen Testing Tool, Publicly Released

We are recommending for quite a while for companies serious with their IT security to subject itself to a thorough penetration testing. Pen test can be done internally by knowledgeable IT staff, or the company can hire an external pen testing team. Members of pen test teams are passionable when it comes to detecting weaknesses

[ Read More ]