Elnaz Babayeva, Senior AI Researcher at Avast, has always loved math. She was introduced to the PASCAL programming language at the age of 15 and decided she would become a programmer. Three years later, she decided to get a computer science…
Adafruit, a distributor of Raspberry Pi single board computers, has mandated that certain new purchases can only be completed with the use of two-factor authentication. The new requirement is due to reselling schemes that use bots to buy up…
A marketing firm asked 1,250 small business owners (with fewer than 500 employees) about their cybersecurity practice, and the results are pretty staggering. They largely show that most aren’t doing much to prepare for potential attacks, an…
The tech industry continues to struggle to attract and retain talented women — and talented women continue to struggle within an industry that is still far from welcoming. That’s why it’s so important to recognize and lift up the exceptiona…
Nearly every day online, we’re asked to provide some element of our personal information. Birth dates. Government ID numbers. Personal emails. We’re expected to give up this highly valuable information not only to do fun things online – lik…
A man-in-the-middle (MITM) attack consists of a victim, a website the victim would like contact with (such as a bank), and the attacker. The attacker inserts themselves between the victim and the targeted website with the intention to steal…
Avast researchers have found password stealer malware, disguised as a private Fortnite server, where users can meet for a private match, and use skins for free. The malware is being heavily propagated on communications platform Discord. The…
Global conflicts, such as the war in Ukraine, often have a corresponding cyberwar that can affect digital citizens across the globe. As on-the-ground invasions persist, the effects of cyberattacks can easily expand beyond the borders of con…
“In this war, we are seeing cyberattacks from both Russia and Ukraine,” Avast Security Evangelist Luis Corrons recently commented. “And on top of that, a number of cybercriminals are taking advantage of the situation in order to scam good-w…
We observed an increased number of phishing attacks in the Ukrainian cyberspace in February, just before Russia invaded Ukraine on February 24, 2022. The attacks we observed targeted a network infrastructure hardware producer, a domain admi…