Anonymity affords a precarious, irresistible power to teens online. Ask.fm is one app that’s exploding in popularity by allowing users to ask and answer questions to one another anonymously. While Ask.fm is used by many teens as a digital playground to flirt and just have fun (and confess crushes), the lack of a name or Read more…
Millions of users access Social Networks every day in order to share, engage, and look for information as well as entertainment. The transparency of social networks come with a risk and we are very often expose ourselves to hackers and scammers that can take advantage of information we share. Social platforms constantly improve security and […]
On August 4, websites hosted by Freedom Hosting, a service provider that offers anonymous hosting through the Tor network, began to host malicious scripts. This follows media reports from August 3 about US authorities seeking the extradition of the man…
On August 4, websites hosted by Freedom Hosting, a service provider that offers anonymous hosting through the Tor network, began to host malicious scripts. This follows media reports from August 3 about US authorities seeking the extradition of the man…
What a summer of sport it has been. We’ve witnessed in our millions the British & Irish Lions rugby team triumphing in the Rugby Union Test series in Australia; Chris Froome winning the 100th edition of the Tour de France; Missy Franklin taki…
AVAST Evangelists’ share tips about backing up your PC. This time of the year – summer in the Northern Hemisphere – is the time to enjoy yourself while traveling. You want to protect those precious photos and videos that you take of your children or friends having adventures. In the Southern Hemisphere, it’s winter. For […]
Revision Note: V1.0 (August 4, 2013): Advisory published.Summary: Microsoft is aware of a public report that describes a known weakness in the Wi-Fi authentication protocol known as PEAP-MS-CHAPv2 (Protected Extensible Authentication Protocol with Micr…
Severity Rating: Revision Note: V1.0 (August 4, 2013): Advisory published.Summary: Microsoft is aware of a public report that describes a known weakness in the Wi-Fi authentication protocol known as PEAP-MS-CHAPv2 (Protected Extensible Authentication P…
Severity Rating: Revision Note: V1.0 (August 4, 2013): Advisory published.Summary: Microsoft is aware of a public report that describes a known weakness in the Wi-Fi authentication protocol known as PEAP-MS-CHAPv2 (Protected Extensible Authentication P…