Controlling access is the basis of all security. The right people should be allowed in, and the wrong people kept out. This is done by confirming – or authenticating – the identity of the person seeking access, and then checking that the person is auth…
Over the past few weeks, more than 130 million user records, allegedly collected from 14 company data breaches, have been put up for sale on numerous hacking forums. Bleeping Computer reported that the seller, a known data breach broker, claims all the…
While encryption technologies have been key tools for ensuring web traffic stays private and secure, cybercriminals are also using encryption to hide malware and execute web-based attacks.
Earlier this month, a group of hackers published a massive dataset stolen from various local law enforcement agencies. The data has been labeled BlueLeaks and contains more than 269 GB of thousands of police reports that go back at least two decades fr…
How to set up a server for a small business
As your business grows and you take on more employees, the time will come where you need a server to keep your office network and business running efficiently. But with a seemingly endless array of choices a…
Security researchers have discovered what they believe to be a global surveillance campaign whereby attackers were using malicious Google Chrome browser extensions to steal data and spy on over 100 networks. Threatpost reported that the researchers sus…
Phishing is the most prolific category of cyber scam. Others include romance scams, mugged in London scams, advance fee frauds and many more. Most scams seek to part you from your money – phishing is unique in seeking your personal data, usually in the…
This spring, Avast’s Sean Obrey had the pleasure of sitting down with Light Reading’s Phil Harvey twice to discuss the new world of 5G cybersecurity and how Avast can create value for service providers.
As cloud-based technologies become the tool of choice for today’s global workforces, keeping businesses protected from web-based attacks is a primary challenge for IT service providers.
Avast researchers have discovered a large campaign of HiddenAds on the Google Play Store. HiddenAds refers to a family of Trojans that disguise as safe and useful applications, but in fact only serve to display intrusive ads to the user. The discovered…