Malware Attacks

      No Comments on Malware Attacks

Make sure you friend Avast on Facebook so you won’t miss our original comic strip, MALWARE ATTACKS!!. Here’s a quick catch-up in case you missed the first installment – We meet unfortunate aliens fleeing their embattled home world in search of help against the evil Malware Empire. The fate of their planet rests on their […]

Just One of Many Internet Scams

      No Comments on Just One of Many Internet Scams

A good friend of mine called me recently to ask what I knew about scams from online sales. He had placed an ad on CraigsList for something he was trying to sell and had asked for $150 for the item. He had received a call from a woman and she offered to send him a Read more…

MWC 2013: What’s the Hot Ticket?

      No Comments on MWC 2013: What’s the Hot Ticket?

Mobile World Congress, or MWC to the veterans, has arrived once again. We’ve been busy preparing for this event for the past couple of months, and now that we’re here, we’re faced with sleep deprivation, increased caffeine intake, and indecision as to whether or not we’ll need a sweater in the confusing Barcelona climate.  Nevertheless, Read more…

Taking Privacy to Extremes: What Consumers Need to Know

“Those who would give up essential liberty to purchase a little temporary safety, deserve neither liberty nor safety.” – Benjamin Franklin Personal privacy: It’s a tenant of American citizenship, but also the source of a long-held debate over the balance between an individual liberty and national security. Where should governments draw the line, and what Read more…

Making the most of website analytics

      No Comments on Making the most of website analytics

 
Following on from our recent webinar on the theme of website optimisation we have developed a series of three blog posts that discuss website optimisation. These are high level blogs and not intended to be all encompassing but rather have been d…

Digging Into the Sandbox-Escape Technique of the Recent PDF Exploit

As promised in our previous blog entry for the recent Adobe Reader PDF zero-day attack, we now offer more technical details on this Reader “sandbox-escape” plan. In order to help readers understand what’s going on there, we first need to provide some background. Adobe Reader’s Sandbox Architecture The Adobe Reader sandbox consists of two processes: Read more…

Apple Hit by Same Java Exploit as Facebook in Largest-Ever Cyber Attack on Corporate Mac Computers

Add Apple to the list of high-profile companies hit by hackers as of late, right on the heels of a similar attack on Facebook just last week. According to Reuters, this is the widest known cyber attack to ever target corporate Apple computers. In other words: This is a big deal. For both Facebook and Read more…

PCI DSS 3.0 – What Merchants Need to Know

      No Comments on PCI DSS 3.0 – What Merchants Need to Know

This October, the Payment Card Industry Security Standards Council (PCI SSC) will be issuing a major update to the PCI Data Security Standards (PCI DSS), which are required for accepting all electronic payments. The new additions will be discussed and presented at community meetings throughout the year, but in the meantime, it is crucial for Read more…

Risky Mobile Applications Plague Users

      No Comments on Risky Mobile Applications Plague Users

Once you own a smartphone or tablet, you are not likely to give it up. But it is essential that you can understand where the risks are and steer around them as you enjoy your mobile digital life. With the growth in mobile exploding, it is only natural for cybercriminals to move towards that device Read more…