Let me present a thought experiment: Imagine you are a dissident fighting for democracy in Venezuela. The government controls access to financial services through state institutions. Those loyal to the regime have access to the nation’s scant …
Amazon is taking legal action against the administrators of more than 10,000 Facebook groups that generate fake reviews for Amazon products. The phony reviews appeared on Amazon marketplaces across the US, UK, Germany, France, Italy, Spain, an…
We’ve often made recommendations about patching your systems. Patching is a simple concept to explain: Keeping all your various digital components (hardware, software, and networking infrastructure) up to date with the most recent versions. Ho…
Earlier this year, the Indian government announced new legislation which requires virtual private network (VPN) operators to store user data for a period of five years as part of a crackdown on digital privacy rights. Nonetheless, Avast contin…
The next time someone sends you an email with a PDF attachment, take a moment before clicking to open it. While most PDF files are benign, hackers have recently been using PDFs in new and very lethal ways.
Currently in beta and expected to ship in the fall, Apple’s new Lockdown Mode removes certain features and functionalities from iPhones, iPads, and other macOS-powered devices in order to neutralize zero-click exploits. The mode blocks incomin…
Tech abuse involves much more than sharing passwords. It can be anything from unwanted messages, spyware or stalkerware being installed on devices, to controlling or harassing someone via home tech.
June was Pride Month, and all month long we celebrated and honored the themes of diversity and inclusion. We kicked it off with our company-wide D&I Download newsletter, in which we reminded Avastians the month is not just a time of celebr…
June was Pride Month, and all month long we celebrated and honored the themes of diversity and inclusion. We kicked it off with our company-wide D&I Download newsletter, in which we reminded Avastians the month is not just a time of celebr…
Malware-infected Microsoft Office macros have been around for close to three decades. These exploits involve inserting code into a seemingly innocuous Word or Excel macro, which is then downloaded by an unsuspecting user by clicking on a phish…