Fresh Start in Education boasts a 96% success rate helping at-risk students struggling with education and learning to re-engage and re-integrate into school and work. The company’s approach, tools, and training enable children and yo…
A U.S. Senate subcommittee has released a new bipartisan report that documents the glaring failures of eight federal agencies to address major cybersecurity vulnerabilities.
This week the ransomware known as Troldesh, which made headlines early this year, spiked again in Russia, Mexico, and the U.S.
A secure browser
For most of us, our web browser is the internet. It’s how we directly access the information and content online, for work, for fun, for research, for finance, for communication and almost everything else we do online.
Hackers grab your computer files – should you pay to get them back? A small Florida city did just that by agreeing to pay more than half a million dollars in ransom to regain access to files and data that were locked and encrypted.
Will Libra tip the scales?
Facebook announced recently that it is developing a cryptocurrency called Libra with various corporate partners such as Uber, Visa, Mastercard, and PayPal, according to the Associated Press. World finance leaders have expre…
The Internet of Things is a panoply of ingenious new devices making our future more convenient and sophisticated – until the machines turn on us and the whole thing comes crashing down.
Avast has teamed up with network solution specialists Juniper Networks to explore the overall market opportunity for mobile network operators (MNOs) to better protect the digital family.
The internet brings many great opportunities for children to lea…
Now and then a named cybersecurity threat enters public conversation, making headlines with a colorful name like WannaCry, Bad Rabbit, or RobbinHood. (You have to admire hackers’ creativity when it comes to naming these things.) A new name has pop…
This spring marked the 20th anniversary of the Melissa email virus, which spread around the globe, setting the stage for social engineering to become what it is today.