The mobile phone is a logical extension to the physical person —we all have one. We organize our lives by it, from keeping fit to managing finances. They are invaluable. But in parallel with the benefits come increasing threats.
Last year’s CyberSec&AI conference won ‘Event of the Year’ at the 2019 AI Awards. Building on its success, the 2020 edition will be a virtual conference, opening up access to a much wider audience. One of the key architects of the event is Michal P…
Google, Bing, Yahoo, Yandex, and Baidu are some of the world’s top search engines and serve as the starting point for millions of internet users seeking information. Most people probably don’t browse past the first two or three pages of search result…
ATMs have long been targets for thieves; several years ago there was the Tyupkin malware, which could control their cash drawers. But a more popular form of attack is carried out via ATM and gas pump card skimmers, which are typically overlays attached…
While spyware and infostealers seek to steal personal data, stalkerware is different: it steals the physical freedom of the victim. Usually installed secretly on mobile phones by ‘friends’, jealous spouses, ex-partners, and sometimes concerned parents,…
Since the lockdown began, Avast Security Ambassador Garry Kasparov has been observing the world from his home in New York, noting the seismic shift in our work culture, our tech practices, and our day-to-day living. As the subjects of home cybersecurit…
Last week, Google and the Cybercrime Support Network launched a public service site called Scam Spotter that aims to bring scam awareness and fraud protection to all users, including the least tech-savvy. The site uses an easy-to-read large font and ve…
Spring has always been synonymous with cleaning — warmer weather and longer days work as a stimulant encouraging people to become more active. After months of cooler climates and — more recently, shelter-in-place — there’s no time like the present to t…
There is no question that cloud services and other digital technologies can drive speed and performance, especially for small and mid-size businesses (SMBs) — and SMBs are making the transition in increasing numbers. In fact, data shows nearly half (46…
Rumors that a massive LiveJournal hack occurred several years ago were proven true this week as 26 million stolen credentials from the popular online journaling platform went up for sale on the dark web. ZDNet reported that rumors of the hack have been…