Elon Musk is set to spend billions of dollars to acquire Twitter and control its destiny. And he’s already making promises about how he can create a more open, free, and authenticated Twitter experience.
CARO Workshop is an independent annual gathering of cybersecurity experts, and this year, the event will be held by Avast. CARO 2022 will be taking place on May 4-6, 2022, in Brno, Czech Republic.
Read on as Luis Corrons, Conference Chair,…
Emotet has evolved into a monetized botnet-as-a-service platform over time, designed to deploy other malware or run campaigns via pay-per-install (PPI) offers, where cybercriminals pay other cybercriminals with a botnet network of infected …
Last week, Barack Obama delivered a keynote address at an event, “Challenges to Democracy in the Digital Information Realm”, co-hosted by The Stanford Cyber Policy Center and the Obama Foundation. The in-person event had more than 250,000 p…
When we wrote about state privacy laws earlier this year, Virginia, California, and Colorado were the only states with laws in place to protect consumers’ privacy. (Nevada has also had a more limited law since 2019.) Since then, Utah Govern…
Late last year, Facebook CEO Mark Zuckerberg announced that the Facebook parent company would be rebranded as Meta. As part of that announcement, he talked about his dream that Meta will eventually be a “metaverse company.” What does that m…
Researchers analyzing anomalies in network traffic coming from a hospital elevator followed the trail to an unsecure TUG Home Base server, which is used to monitor and manage the Aethon TUG robots used by the hospital. The researchers found…
Today, we’re happy to introduce USB Protection, a new feature available in the Avast Business Hub as well as Avast Business Premium and Ultimate Business Security. USB Protection safeguards company data by preventing employees from using un…
I usually endeavor to separate my political activities and my cybersecurity and digital rights advocacy, except for cases in which they are inextricably connected. You can say that everything is connected, of course, and that is true, but y…
When Phyllis Weisberg, 90, received a phone call claiming that there was an issue with her computer, she knew she had to do something right away. The person on the other end told her that they could help her — but it would be for a fee. Phy…