This holiday season, you can count on just about everyone to shop smart, and I mean that in both senses of the phrase. Everybody wants to get the best deals and the most bang for their buck, yes, but I’m also talking about the internet of things, tho…
Our partners in Germany recently cast their vote for best remote monitoring and management solution (RMM) at two local awards events in Schloss-Holte Stukenbrock and Munich. The verdict?
Another Facebook flaw puts user data at risk
The media is abuzz this week with news about Facebook falling victim to yet another vulnerability that could have exposed very sensitive, private user data.
While it makes a great title, not ALL browser extensions are evil. In fact, most can be helpful. The problem is that each and every browser extension, no matter its intended function, has the capability to turn your digital world upside down. Given t…
The Avast Business Mobile Workforce Report 2018 shows small business owners what matters most to their employees and how they can create a mutually beneficial work environment that delivers optimal productivity alongside employee wellbeing.
Phishing is a long-standing social engineering technique used by cybercriminals to trick people into giving up sensitive information such as credit card details and login credentials. It can come in many forms, including telephone phishing, smishing …
If you’re following password best practices — and you are, right? — then you’ve got dozens of extra-long, extra-complex passwords to remember, and you’re using a unique one for each account — no repeats. (And we’ll add a hearty “Good job!” for t…
Cryptocurrency code breached, targeting Bitcoin exchanges
New research from Radboud University, related to the way the self-storage devices (SSDs) encrypt stored data, found that serious vulnerabilities exist in widely used products from popular manufacturers like Samsung and Crucial (Micron Technology). &n…