Advances in voice cloning have brought computer-generated audio to a level the BBC reports “is now said to be unnervingly exact” and that some experts believe may constitute a substantial security hazard. The AI-led technology learns and ad…
“I’ve always found the best way to get a kid to learn how to hack is to tell them to just never use the computer,” Dave Aitel confides to Jaya Baloo in Episode 8 of our podcast Avast Hacker Archives (AHA). Dave is speaking from experience. …
Now that you’ve read our blog entry, “What is your digital footprint?”, you know everything you share and do online is permanent and can either help or hurt your reputation. Are you ready to clean up your online reputation for job interview…
Since the beginning of 2021, there’s been a rise in the prevalence of crypto-related phishing sites in certain parts of the world. The rise of these fraudulent sites is higher in countries where cryptocurrency adoption is most prevalent. Th…
Earlier this year, Google announced a new way for advertisers to reach consumers without using cookies to track them individually across sites and applications. Federated Learning of Cohorts (FLoC) groups an individual with people who have …
For many years, cybersecurity companies have invested in building sensor networks and detection capabilities to build a greater understanding of adversaries’ tactics, ever-changing techniques, and the threats posed to the world’s internet c…
This post was written by the following Avast researchers:
Petr Somol, Avast Director AI Research
Tomáš Pevný, Avast Principal AI Scientist
Viliam Lisý, Avast Principal AI Scientist
Branislav Bošanský, Avast Principal AI Scient…
“It never rains but it pours.” It’s the saying that describes situations in which several bad things happen at once, and these situations are ones that security incident teams know well. In fact, security teams across the globe have quite r…
Twitter People Experience Designer Lena Emara tweeted 4 new Twitter security feature concepts, asking users for feedback on whether or not they should move into development. “Privacy is one of those things everyone wants, but it’s not a one…
If you’re active online, you have a digital footprint. Everyone does. Every comment made on social media, every news article shared, and every purchase made online contributes to a person’s data trail. Your data trail reveals a detailed pic…