Today, we’re happy to introduce USB Protection, a new feature available in the Avast Business Hub as well as Avast Business Premium and Ultimate Business Security. USB Protection safeguards company data by preventing employees from using un…
I usually endeavor to separate my political activities and my cybersecurity and digital rights advocacy, except for cases in which they are inextricably connected. You can say that everything is connected, of course, and that is true, but y…
When Phyllis Weisberg, 90, received a phone call claiming that there was an issue with her computer, she knew she had to do something right away. The person on the other end told her that they could help her — but it would be for a fee. Phy…
Since we last wrote about Payment Card Industry Data Security Standards (PCI DSS), the organization has made a series of updates to its standards with its latest version 4.0. It contains several important improvements, which we’ll break dow…
Some researchers, business specialists, and forecasters believe the metaverse – the virtual reality platform accessed by devices like Meta’s Oculus Quest 2 – will reach the same popularity and generate the same revenue as the internet. Bloo…
Today, most risks facing consumers from cyber criminals can be tied back to credential or data theft in some form. What if there was a future in which technology stopped this from happening?
Today, most risks facing consumers from cyber criminals can be tied back to credential or data theft in some form. What if there was a future in which technology stopped this from happening?
We recently carried out research that revealed that more than four in five people (85%) have accepted cookies on a website without reading any of the policies; more than a third (37%) say they’ve done so only to later discover they had agre…
Private data could be collected from thousands of Android and iOS apps via Yandex, the leading search engine in Russia, according to security researchers. The issue revolves around how this data might be available to Russia state agencies. …
Malware group FIN7 is once again on the move, leveraging software supply chains, remote program execution methods, and stolen credentials to deliver ransomware to enterprise networks. The group has been around since at least 2015. Initially…