‏Athena Martinez is a security expert/analyst geek with almost 5 years of experience, writes on various topics pertaining to internet security with latest happening in the IT world thoroughly.

VPN Apps Not Working As Intended, Exposed

As an IT professional for decades, we are always highlighting the importance of VPN when it comes to maintaining security and privacy. It is the most cost-effective way to isolate a connection from prying eyes, a VPN creates a secure virtual pipe from the user’s origin device to the VPN vendor’s exit node, wherever it

[ Read More ]

Hackers Can Use Unused Internet Explorer to Steal Data

This is no less than a shocker…Hackers can now use Internet Explorer to steal your data, that too even if you never use it. A security researcher has detected a zero-day vulnerability in Internet Explorer which would allow hackers to steal data. Security researcher John Page has published details and proof-of-concept code for the zero-day

[ Read More ]

A Quick Glimpse Of Hong Kong’s Cybersecurity Readiness

The Hong Kong Special Administrative Region has governed under a One-China, Two-systems policy since 1997. That means the great firewall of China which is enforced in the mainland is not applied in Hong Kong. It decides on its own about its internal policies when it comes to governance, including the responsibility of making sure that

[ Read More ]

Two UK Agencies Commit Accidental Contact Information Leaks

The United Kingdom is currently processing its Brexit documents to complete the process of leaving the European Union for good. But it is now at the very center of another controversy as 240 EU-member state nationals applying for EU settlement scheme program had their email addresses leaked from the UK Home Office due to an

[ Read More ]

Android Phone as Physical Security Key for Google Accounts

Great news indeed! Google has come up with a new advanced two-factor authentication method that would help you secure your Google accounts using your Android phone as a physical security key. This new advanced two-factor authentication method secures Google accounts when users log in using the Chrome browser. This service can be used on Android

[ Read More ]

The State Of BayState Health Data Breach

A huge phishing campaign has brought Baystate Health to losing an estimated 12,000 individual patient record, the Massachusetts-based healthcare provider disclosed. The affected information that was breached includes full name, birthdate, medical record, diagnostic record, health insurance details, and social security numbers. The records were breached from the period of February to March 2019, and

[ Read More ]

4 Simple Actions To Fight PC Infections

In today’s cybersecurity atmosphere, there is no way for any organization to assume that “we are not hacked”. The attack surface is very wide in Windows, Office, Java, Flash Player, and even the Intel processors have hardware security bugs. Basically, 2018 was a horrible year for cybersecurity because it proved how indefensible is the architecture

[ Read More ]

Top 10 Misconceptions In Cybersecurity

Cybersecurity is a big word that is being used by IT professionals and the mainstream media nowadays, unfortunately, the latter still lack understanding on how to explain it to common people. There is a gap between how the cybersecurity vendor markets their products and services vs how the mainstream media handle the reports as if

[ Read More ]

Android Q’s Deep Press, an iPhone 3d Touch Clone

We are in the day and age that both Android and iOS are both copying each other’s features, which is not a big deal given how both platforms are already in their maturity stage. Google has decided to silently implement a feature that resembles 3d touch in iPhones, they call it the “Deep Press”, which

[ Read More ]

Why Are Web Hosting Servers Often Planted With Malware?

Ten nasty malware are currently having a field day infecting and using 10 corporate-level web hosting servers for further malware deployment to site visitors. The campaign which saw the progressive growth of Azorult, Gandcrab, Neutrino, Hermes, IcedID, Trickbot, Nymaim, Gootkit and Dridex in these 10 servers were linked to the Necurs botnet. It is a

[ Read More ]