‏Athena Martinez is a security expert/analyst geek with almost 5 years of experience, writes on various topics pertaining to internet security with latest happening in the IT world thoroughly.

Comprehensive Cybersecurity Plan, A Must For Firms

Cyber ​​attacks are changing with the times. Initially, personal cyber-attacks were nothing but digital vandalism, seeking for 15-minutes of fame were mainstream, but the people behind the attacks today shifted to economic reason why they are into it – for money. They target organizations, important infrastructures, and state agencies, the incidents became increasingly sophisticated, complicated

[ Read More ]

Current 5G Situation vs “Legacy” 4G, Is AI Extension Necessary?

5G is being developed so that different requirements such as “high-speed, large-capacity data communication”, “connection of many terminals”, and “ultra-low latency and ultra-reliability” can all be satisfied with one network platform. However, in actual use situations, networks can be virtually separated and provided depending on the purpose of each use. This technology is called “network

[ Read More ]

Slack’s Late Forced Password Reset For 2015 Data Breach

The workflow collaboration software Slack is in the hot seat once again for its 2015 data breach, as it only took them till July 18, 2019 (4 years) to announce that they will forcefully implement a password reset for the affected accounts. Slack developers have made the announcement in their official corporate blog site, as

[ Read More ]

Basic Online Shopping Safety Guide For All

Online shopping at the privacy of one’s home or mobile device is very convenient because you can shop at any time, anywhere, without physically going to a brick and mortar store. In addition, you can even purchase heavy things can be delivered to your home. But just like a regular Thethreatreport.com reader, you should know

[ Read More ]

Russian-made FaceApp Accused Of Massive Facial Image Collection

We really are living in the future, with the growth and fast development of face recognition technology. It all started with the hardware, Android made face unlock a public feature starting with Android 4.0 Ice Cream Sandwich (ICS) in 2011, that was eight years ago. It was seen as a gimmick, as a static image

[ Read More ]

Personal Information Of Million Bulgarians Taxpayers Stolen

Bulgaria, an Eastern European country of 7 million people is a recent victim of a large-scale data breach, as its state tax agency’s tax information storage servers were hacked last June 2019. No other than its Minister of Finance, Vladislav Goranov issued a public apology for the incident that happened under his watch. Security researchers

[ Read More ]

How Cryptocurrencies Increase Transaction Security?

From time-to-time we feature cryptocurrency stories here in Thethreatreport. Hence, it is really necessary for us to explain what it is, in an easier to understand language for the newbies. This article is highly recommended to read before getting deeper with the cryptocurrency cybersecurity news that we feature in this website: The legal currency used

[ Read More ]

K12.com – 7Million Student’s Record Data Breach Exposed

Records show that K12.com, a web-based educational firm has suffered a massive 7-million student records breach due to an insecure version of MongoDB database server. Bob Dianchenko a security researcher at Comparitech has witnessed student data from K12.com was made public on June 25, 2019. According to his discovery, it took K12.com more than a

[ Read More ]

Are Companies Still Doubting Cloud-Computing?

The 2019 Access Management Index report revealed by Thales has provided a quick glimpse of how corporations’ top IT decision makers are coping with cloud-computing push by the industry. 49% of the 1050 IT corporate leaders suggest that they will not embrace cloud computing at this time, due to the issue of becoming a target

[ Read More ]

1,300+ Apps Bypass Android Permission Restrictions

Android 6.0 Marshmallow (and later) is hailed for giving its default user the capability to grant/deny granularly the permissions asked by apps, something that only rooted/custom roms users were able to do prior. However, contrary to the permissions feature, a study conducted by the University of Calgary, U.C. Berkeley, Universidad Carlos III de Madrid and

[ Read More ]