What a summer of sport it has been. We’ve witnessed in our millions the British & Irish Lions rugby team triumphing in the Rugby Union Test series in Australia; Chris Froome winning the 100th edition of the Tour de France; Missy Franklin taki…
AVAST Evangelists’ share tips about backing up your PC. This time of the year – summer in the Northern Hemisphere – is the time to enjoy yourself while traveling. You want to protect those precious photos and videos that you take of your children or friends having adventures. In the Southern Hemisphere, it’s winter. For […]
Revision Note: V1.0 (August 4, 2013): Advisory published.Summary: Microsoft is aware of a public report that describes a known weakness in the Wi-Fi authentication protocol known as PEAP-MS-CHAPv2 (Protected Extensible Authentication Protocol with Micr…
Severity Rating: Revision Note: V1.0 (August 4, 2013): Advisory published.Summary: Microsoft is aware of a public report that describes a known weakness in the Wi-Fi authentication protocol known as PEAP-MS-CHAPv2 (Protected Extensible Authentication P…
Severity Rating: Revision Note: V1.0 (August 4, 2013): Advisory published.Summary: Microsoft is aware of a public report that describes a known weakness in the Wi-Fi authentication protocol known as PEAP-MS-CHAPv2 (Protected Extensible Authentication P…
Revision Note: V1.0 (August 4, 2013): Advisory published.
Summary: Microsoft is aware of a public report that describes a known weakness in the Wi-Fi authentication protocol known as PEAP-MS-CHAPv2 (Protected Extensible Authent…
When developers are unaware of security they open the door to threats against their customers and users. We are not just talking about exploitable vulnerabilities in their code, but about something much more obvious than that. Here is the curious case of an Android application on Google Play that contains some traces of malware, but Read more…
This year may just be deemed the era of the cyber security breach, with scores of online attacks running up millions of dollars in damages to a number of financial institutions. The tactics used range from revenge-focused “hacktivism” to illicit credit card scandals—a variety of scams that emphasize just how important it is to use Read more…
Parents are without a doubt their children’s most important role models. The way we interact with our friends, the way we deal with problems and the language we use all become our children’s subconscious ‘how-to’ guide. Of course, none of us are perfect – although don’t tell the kids that! We all make mistakes and Read more…