While it makes a great title, not ALL browser extensions are evil. In fact, most can be helpful. The problem is that each and every browser extension, no matter its intended function, has the capability to turn your digital world upside down. Given t…
The Avast Business Mobile Workforce Report 2018 shows small business owners what matters most to their employees and how they can create a mutually beneficial work environment that delivers optimal productivity alongside employee wellbeing.
Phishing is a long-standing social engineering technique used by cybercriminals to trick people into giving up sensitive information such as credit card details and login credentials. It can come in many forms, including telephone phishing, smishing …
If you’re following password best practices — and you are, right? — then you’ve got dozens of extra-long, extra-complex passwords to remember, and you’re using a unique one for each account — no repeats. (And we’ll add a hearty “Good job!” for t…
Cryptocurrency code breached, targeting Bitcoin exchanges
New research from Radboud University, related to the way the self-storage devices (SSDs) encrypt stored data, found that serious vulnerabilities exist in widely used products from popular manufacturers like Samsung and Crucial (Micron Technology). &n…
A quick Google search for “business security products” will produce an unwieldy number of results. How is a company to choose?
You make your home “smarter” which each connected device you add — a smart doorbell, a smart thermostat, a smart television — almost everything comes in a “smart” version these days, even toothbrushes. Device by device, you grow this IoT univers…
Thinking of buying a smart door lock or a thermostat? Good news, consumers! Starting Jan 1, 2020, new internet-connected consumer products such as mobile phones, smart appliances, home alarms, monitors, trackers, and cameras that are sold in Californ…