The next time someone sends you an email with a PDF attachment, take a moment before clicking to open it. While most PDF files are benign, hackers have recently been using PDFs in new and very lethal ways.
Currently in beta and expected to ship in the fall, Apple’s new Lockdown Mode removes certain features and functionalities from iPhones, iPads, and other macOS-powered devices in order to neutralize zero-click exploits. The mode blocks incomin…
Tech abuse involves much more than sharing passwords. It can be anything from unwanted messages, spyware or stalkerware being installed on devices, to controlling or harassing someone via home tech.
June was Pride Month, and all month long we celebrated and honored the themes of diversity and inclusion. We kicked it off with our company-wide D&I Download newsletter, in which we reminded Avastians the month is not just a time of celebr…
June was Pride Month, and all month long we celebrated and honored the themes of diversity and inclusion. We kicked it off with our company-wide D&I Download newsletter, in which we reminded Avastians the month is not just a time of celebr…
Malware-infected Microsoft Office macros have been around for close to three decades. These exploits involve inserting code into a seemingly innocuous Word or Excel macro, which is then downloaded by an unsuspecting user by clicking on a phish…
Over the past few years, classrooms have moved to kitchens and bedrooms and playgrounds have been replaced by online video games. The methods for making friends have forever been altered. Internet friendships are often more common than real-wo…
We’ve covered the dangers and necessary defenses against various scams, including romance scams, supply chain scams, financial scams, lottery scams, and vishing scams, but now we turn our attention to what could be the most personal and invasi…
Yesterday was a major milestone in the evolution of the Web. The World Wide Web Consortium (W3C) announced it was overruling the objections of Apple, Google, and Mozilla and approving W3C Decentralized Identifiers (DIDs) 1.0 as a W3C Recommend…
Despite concerns from privacy advocates, Australia is currently the only democracy in the world that uses facial recognition technology to aid Covid-19 containment procedures. Police ensure that Western Australian citizens are following the se…