We’ve enhanced our all-in-one service, Avast One, by introducing brand new features designed to protect you from online scams, fraud, and other personal privacy threats. A key mobile-first enhancement released on Android, Scam Protection, m…
Security researchers have uncovered a new series of threats that are targeting uninterrupted power supply (UPS) units. These threats can result in malware attacking the computers connected to the same networks through a variety of clever me…
Security researchers have uncovered a new series of threats that are targeting uninterrupted power supply (UPS) units. These threats can result in malware attacking the computers connected to the same networks through a variety of clever me…
One of the best any person can do to move their career forward is find a great mentor. And for women in tech — who are underrepresented across the board — mentorships are especially important. A solid mentor/mentee relationship can not only…
Cyber strategist Pete Lindstrom maintained in an article on CSO that cybersecurity risk is constantly changing in a way analogous to the probability odds in a March Madness tournament. Observing the constant data-analysis on the 538 March M…
The German Federal Criminal Police Office (BKA) is currently warning against fraudulent calls in the name of Europol or alleged international investigation teams. The perpetrators falsely claim that victims’ personal data or identity …
Before you download another application from the more than three million that are in the Google Play Store, read on to learn a few simple things you can do to protect yourself. Before we get into that, let’s establish why this is worthwhile…
Elnaz Babayeva, Senior AI Researcher at Avast, has always loved math. She was introduced to the PASCAL programming language at the age of 15 and decided she would become a programmer. Three years later, she decided to get a computer science…
Adafruit, a distributor of Raspberry Pi single board computers, has mandated that certain new purchases can only be completed with the use of two-factor authentication. The new requirement is due to reselling schemes that use bots to buy up…
A marketing firm asked 1,250 small business owners (with fewer than 500 employees) about their cybersecurity practice, and the results are pretty staggering. They largely show that most aren’t doing much to prepare for potential attacks, an…