Hosted by Avast CISO Jaya Baloo, the Avast Hacker Archives (AHA) series showcases the valuable “Aha!” moments achieved by white hat hackers and researchers that changed the course of our digital world.
Twitter has launched a pilot program called Birdwatch, a “community-based approach” to identifying misleading information in tweets. ZDNet reports that users will be able to write notes to provide context for tweets. The notes then get rated by partici…
If you’re supporting an elderly member of your family, you might be interested in a collection of home tech devices that can help extend their ability to live more safely and independently. We all need help as we get older, and I write this column base…
For those of you not in the know, it is that time of the year again. On Thursday, January 28, we celebrate – or at least sheepishly acknowledge — Data Protection Day. This particular day on the calendar came to be back in 2007. What’s more, this year m…
Today, law enforcement agencies from around the world successfully wrested control of the Emotet botnet away from its operators. They also took new unprecedented steps to help possible Emotet victims. These steps hopefully bring to a close the story of…
Smart home technology is changing our homes. Today, we live side by side with no shortage of smart devices which make our daily lives easier in various ways. At the same time, these gadgets can create opportunities for attackers. …
Peloton, the connected device that lets spin-class enthusiasts take classes from home, was already gaining traction when the pandemic took off globally in March of 2020. But as it became clear that people weren’t going to be sweating it out in group se…
Peloton, the connected device that lets spin-class enthusiasts take classes from home, was already gaining traction when the pandemic took off globally in March of 2020. But as it became clear that people weren’t going to be sweating it out in group se…
When John’s friend Irene* fell in her home, it took her an hour to crawl to the phone and call for help. And once she’d recovered, the big question was: What do we do now?
Increasingly, law enforcement agencies and lawmakers are asking smartphone developers like Apple and Google to create backdoors into the encryptions that protect user data. But even without them, investigators can access your data.