The DDosia project is a successor of the Bobik botnet linked to the pro-Russian hacker group called NoName(057)16, as revealed in a recent analysis by Avast researcher Martin Chlumecky. The group targets DDoS attacks on private and public orga…
Buying and selling secondhand items has become pretty popular, as there are some platforms that allow people to do it easily from home. One of these platforms is Vinted, which is a well known site in Europe and North America to buy and sell se…
Smishing has become an increasingly popular attack method among cybercriminals – and they’re getting better at using it.
Shopping online can be a convenient and enjoyable experience. However, with so many fake and counterfeit products on the market, it’s crucial to know how to spot the real deal. Here are six tips on how to tell whether an item is legitimate whe…
If you’re looking for recommendations for infosec books to give to a colleague – or even to catch up on some holiday reading of your own – here’s a suggestion: Take a closer look at the oeuvre of Bruce Schneier, a cryptographer and privacy spe…
The 38 member countries of the Organization for Economic Cooperation and Development (OECD) have recently adopted a new international agreement regulating government access to its citizens’ private data. The OECD draws on its membership from c…
The 38 member countries of the Organization for Economic Cooperation and Development (OECD) have recently adopted a new international agreement regulating government access to its citizens’ private data. The OECD draws on its membership from c…
For those of you that are on your way to take a break next week, we’ve got a bit of advice to avoid encountering some unnecessary scares during this time that you’ll be spending with your loved ones.
The EU Digital Identity Wallet Consortium (EWC) has been selected by the European Commission to run one of the Large Scale Pilots for the new EU Digital Identity Wallet (EUDI) ecosystem. Avast sits on the Executive Team of the consortium, havi…
A July 2022 survey of 300 U.S. Department of Defense (DoD) IT contractors shows a woeful lack of information security in the majority of situations. These contractors are part of the DoD’s supply chain that, in typical government speak, is lab…