Many species evolve in parallel, each seeking a competitive edge over the other. As cybersecurity and technology have evolved, so have criminals and ‘bad actors’ who seek to exploit weaknesses in the system for personal gain – or just to prove a point….
One of the most important parts of the holidays is the traditions we have. This is where we put the tree. This is what we eat at Thanksgiving dinner. This is who cooks which dish. This is where we place the menorah. This year, many of us are choosing n…
One of the most important parts of the holidays is the traditions we have. This is where we put the tree. This is what we eat at Thanksgiving dinner. This is who cooks which dish. This is where we place the menorah. This year, many of us are choosing n…
Instagram is tracking basically everything you do. Seriously — their privacy policy, such as it is, might be one of the broadest I’ve ever seen. For example, if you use their in-app camera, they reserve the right to analyze what’s in the image and ther…
CEO Jack Dorsey has tapped Peiter Zatko, otherwise known as famed white-hat hacker “Mudge,” as the new head of security at Twitter. Zatko is undergoing a review period for 45-60 days before assuming full control of the platform’s security, which encomp…
If you’re looking to boost your career in application security, there is no better place to start than by reading a copy of Tanya Janca’s new book, Alice and Bob Learn Application Security.
This week at Avast, we made the highly anticipated release official: Avast Secure Browser is now available for iPhone, iPad, and iPod! And while going through the development process, one question was constantly on our mind: “What does maximum privacy …
This week at Avast, we made the highly anticipated release official: Avast Secure Browser is now available for iPhone, iPad, and iPod! And while going through the development process, one question was constantly on our mind: “What does maximum privacy …
2020 has been an odd year, to say the least. But one thing has stayed familiar: As we’ve moved more aspects of life online, cybersecurity and privacy threats have adapted to the new normal. We’ve seen an increase in phishing and credential-stuffing att…
Last week, after realizing that I had no idea what my partner had filled my house with — and how our security and privacy might be compromised — I took a deep dive into the Internet of Things (IoT) devices in my home. I found eight different smart devi…