The State of Cybersecurity Today | Avast
Back in 2004, when I co-wrote this USA TODAY cover story about spam-spreading botnets, I recall advising my editor to expect cybersecurity to be a headline-grabbing topic for a year or two more, tops.
Back in 2004, when I co-wrote this USA TODAY cover story about spam-spreading botnets, I recall advising my editor to expect cybersecurity to be a headline-grabbing topic for a year or two more, tops.
Amazon Ring shares customer videos
Ring has caught on with homeowners everywhere, and the doorbell camera is a common sight on doorsteps across the country, which is why Amazon purchased the company for one billion dollars. But Ring has been criticize…
Sure, it’s early yet, but 2019 can award the crown for “Largest Data Breach” to a Lake Forest, California company called Voipo. The voice-over-internet company provides cloud-controlled phone lines for residences and businesses, and its customers’ text…
Amazon founder Jeff Bezos may be a poster child for the American dream — he bravely and successfully forged a new shopping paradigm when we stepped into the brave new digital world as a society — but a recent incident proves he types his texts one…
Amazon founder Jeff Bezos may be a poster child for the American dream — he bravely and successfully forged a new shopping paradigm when we stepped into the brave new digital world as a society — but a recent incident proves he types his texts one…
Hackers, start your engines…
In our first segment, we discussed IoT in 2019. In our second segment, we focused on mobile threats in the new year. And now, in the final segment of our three-part series on 2019 cybersecurity predictions, we’re looking at how artificial intelligenc…
Beware the adware
Google Play has removed 85 fake apps from their store this week, all of them found to contain similar adware. Many of the apps claimed to be video channels or racing games, but by far the most popular was “Easy Universal TV Remote,” …
An alarming investigative probe conducted by tech site Motherboard led to some shocking revelations. A Motherboard reporter stashed his phone somewhere in New York, then hired a bounty hunter to find it. The bounty hunter only needed the phone number…
Here we continue our 3-part series on 2019 cybersecurity predictions by the Avast Threat Intelligence team. Looking at roughly one million new files a day, we gain valuable insights and knowledge of the most prevalent threats. We use this data to map…