The past decade has seen a rise in personal crowdfunding, with people raising money online for everything from school supplies to medical bills to funeral expenses. The appeals go out on social media, imploring friends, families, and acquainta…
Magecart, the notorious credit card stealing cybercrime syndicate, is once again in the news. We last wrote about it last summer, where it compromises Magento shopping cart software pages to steal credit card information. That post had a long …
We’re excited to announce that Avast Ultimate Business Security has received the “Approved Business Product” award for July 2022 by AV-Comparatives!
Let me present a thought experiment: Imagine you are a dissident fighting for democracy in Venezuela. The government controls access to financial services through state institutions. Those loyal to the regime have access to the nation’s scant …
Amazon is taking legal action against the administrators of more than 10,000 Facebook groups that generate fake reviews for Amazon products. The phony reviews appeared on Amazon marketplaces across the US, UK, Germany, France, Italy, Spain, an…
We’ve often made recommendations about patching your systems. Patching is a simple concept to explain: Keeping all your various digital components (hardware, software, and networking infrastructure) up to date with the most recent versions. Ho…
Earlier this year, the Indian government announced new legislation which requires virtual private network (VPN) operators to store user data for a period of five years as part of a crackdown on digital privacy rights. Nonetheless, Avast contin…
The next time someone sends you an email with a PDF attachment, take a moment before clicking to open it. While most PDF files are benign, hackers have recently been using PDFs in new and very lethal ways.
Currently in beta and expected to ship in the fall, Apple’s new Lockdown Mode removes certain features and functionalities from iPhones, iPads, and other macOS-powered devices in order to neutralize zero-click exploits. The mode blocks incomin…
Tech abuse involves much more than sharing passwords. It can be anything from unwanted messages, spyware or stalkerware being installed on devices, to controlling or harassing someone via home tech.