What Can You Do To Make The Internet a Better Place In 2020, you’d be hard-pressed to find an Aussie teen who doesn’t spend a fair whack of their time online. And while many of us parents don’t always love the time our offspring spend glued to screens, most of us have come to accept […]
Less than 48 hours after the killing of Iran’s General Qasem Soleimani, the U.S. Department of Homeland Security issued a bulletin calling out Iran’s “robust cyber program,” and cautioning everyone to be prepared for Iran to “conduct operations in the …
I’d like to take this opportunity and address the situation regarding Avast’s sale of user data through its subsidiary Jumpshot. Avast’s core mission is to keep people around the world safe and secure, and I realize the recent news about Jumpshot has h…
In recent days media outlets have reported on Avast and our subsidiary Jumpshot. We know that when each of our more than 400 million users choose an Avast product, they choose to trust us with their security and privacy. That trust is core not only to …
Analysts and United Nations officials investigating the 2018 hack into Amazon and Washington Post owner Jeff Bezos’ phone believe there is credible evidence that the infiltrating malware originated from a video file Saudi crown prince Mohammed bin Salm…
In today’s competitive business environment, gaining (and maintaining) a competitive advantage providing managed IT and security services is challenging. Commoditization continues and margins are smaller than ever before. Competitors are constantly see…
Around the world, the millions of internet-connected gifts we exchanged over the holidays have been set up, making our homes “smarter.” And less secure.
A hacker recently leaked a list of more than a half-million Telnet credentials for servers, home routers, and smart devices, leaving them vulnerable to attack. Marko Zbirka, an Internet of Things threat researcher at Avast, answered key questions relat…
Cybersecurity researchers have noticed a rise in several new phishing scam strategies in which attackers are successfully outsmarting current spam filters. One of these tactics is conversation-hijacking, a more involved method than simple spamming. It …