We recently highlighted the dangers of some applications that can be downloaded from the Google Play Store onto Android devices. Google is taking steps to address some of these issues ?— but is it enough?
European Union officials Cedric O and Thierry Breton both mentioned on Twitter that they expect Elon Musk to abide by the rules of the new Digital Service Act (DSA). The new legislation requires user-generated platforms to police its conten…
Avast has been a long-term active supporter of people on the spectrum, and for April – World Autism Awareness Month – we pieced together a host of activities, microlearnings, and challenges designed to increase awareness and demystify defin…
Elon Musk is set to spend billions of dollars to acquire Twitter and control its destiny. And he’s already making promises about how he can create a more open, free, and authenticated Twitter experience.
CARO Workshop is an independent annual gathering of cybersecurity experts, and this year, the event will be held by Avast. CARO 2022 will be taking place on May 4-6, 2022, in Brno, Czech Republic.
Read on as Luis Corrons, Conference Chair,…
Emotet has evolved into a monetized botnet-as-a-service platform over time, designed to deploy other malware or run campaigns via pay-per-install (PPI) offers, where cybercriminals pay other cybercriminals with a botnet network of infected …
Last week, Barack Obama delivered a keynote address at an event, “Challenges to Democracy in the Digital Information Realm”, co-hosted by The Stanford Cyber Policy Center and the Obama Foundation. The in-person event had more than 250,000 p…
When we wrote about state privacy laws earlier this year, Virginia, California, and Colorado were the only states with laws in place to protect consumers’ privacy. (Nevada has also had a more limited law since 2019.) Since then, Utah Govern…
Late last year, Facebook CEO Mark Zuckerberg announced that the Facebook parent company would be rebranded as Meta. As part of that announcement, he talked about his dream that Meta will eventually be a “metaverse company.” What does that m…
Researchers analyzing anomalies in network traffic coming from a hospital elevator followed the trail to an unsecure TUG Home Base server, which is used to monitor and manage the Aethon TUG robots used by the hospital. The researchers found…