Cyberbullying – How Parents Can Minimize Impact On Kids

Cyberbullying: if you have a tween or teen and haven’t workshopped this with your kids then you need to put a time in the diary now. Cyberbullying is one of the biggest challenges our children’s generation will face and unfortunately, it isn’t going away. The recent tragic suicide of 14 year old Aussie girl Amy […]

The post Cyberbullying – How Parents Can Minimize Impact On Kids appeared first on McAfee Blogs.

Key vulnerabilities: devices and people | Avast Business

You’ve probably heard countless terms relating to cybersecurity, but here we are going to focus on just one: attack surface. An “attack surface” is simply the number of possible ways an attacker can get into a device or network and extract data. It’s an especially important measurement for SMBs because most think they are too small to be a target, but a quick look at their attack surface shows that it is in fact quite large, increasing their exposure to risk.

Convenience vs. privacy: the Facebook situation | Avast

Everyone’s favorite social media site is currently the subject of hot debate, and we’re here to keep you grounded amidst the madness. First, let’s talk about what happened. Back in 2014, a quiz made the rounds on Facebook. 270,000 users took the quiz, which harvested data not just about them, but also their friends. As a result, the quiz aggregated the private info of 50 million Facebook users. All that data was then allegedly sold to the Trump presidential campaign.

Consumers can lead the way in pressuring tech companies to respect security and democracy | Avast

The example on everyone’s minds is, of course, Russian interference in the 2016 presidential election, now further confirmed by special counsel Robert Mueller’s investigation. The Kremlin’s use of social media to stoke existing partisan tensions in the U.S., achieved through a sophisticated multi-million-dollar operation, resulted in the indictment in February of thirteen Russian nationals and three companies.

Speeding Up and Cleaning Your Mac | Avast Essential Guide

Unfortunately, Macs might be the sports cars of the IT business, but just like any car, they need proper maintenance to keep running. In this guide we’ll walk you through the essentials — and even some great secrets — to clean up invisible clutter and tune up your MacBook, iMac, or Mac Pro beyond its limits.  

Five endpoint threats affecting small businesses | Avast Business

Endpoints are an easy target for hackers, so it’s essential that small businesses protect themselves. Connected employees, vulnerable software and weak antivirus all contribute to this being a favorite target of hackers. And, as the list below details, there are many types of cyberattacks that target endpoints, from phishing to malvertising.

New Monero mining malware discovered in Google Play

In November 2017, we detected a strain of malware known as JSMiner in Google Play. The Monero cryptomining capabilities were discovered inside the gaming application Cooee. At the time of discovery, we forecasted a rise in mobile mining malware as atta…