In recent days media outlets have reported on Avast and our subsidiary Jumpshot. We know that when each of our more than 400 million users choose an Avast product, they choose to trust us with their security and privacy. That trust is core not only to …
Is machine learning useful for cybersecurity?
Analysts and United Nations officials investigating the 2018 hack into Amazon and Washington Post owner Jeff Bezos’ phone believe there is credible evidence that the infiltrating malware originated from a video file Saudi crown prince Mohammed bin Salm…
In today’s competitive business environment, gaining (and maintaining) a competitive advantage providing managed IT and security services is challenging. Commoditization continues and margins are smaller than ever before. Competitors are constantly see…
Around the world, the millions of internet-connected gifts we exchanged over the holidays have been set up, making our homes “smarter.” And less secure.
A hacker recently leaked a list of more than a half-million Telnet credentials for servers, home routers, and smart devices, leaving them vulnerable to attack. Marko Zbirka, an Internet of Things threat researcher at Avast, answered key questions relat…
Cybersecurity researchers have noticed a rise in several new phishing scam strategies in which attackers are successfully outsmarting current spam filters. One of these tactics is conversation-hijacking, a more involved method than simple spamming. It …
You probably heard that Microsoft officially stops support for Windows 7 on Jan. 14th 2020. If you are running the popular operating system, your computer will still function but Microsoft will no longer provide technical support for any issues, softwa…
It’s a pressure cooker for the IT and security channel today — a threat landscape that serves up constant surprises, tighter customer budgets, solution complexity requiring even more time, and then that thing called the “margin.”