This post was written by Alexej Savcin and Michal Stanek.
When Jamil Qandah got a call from Avast tech support, he had no reason to think that it wasn’t really us calling. It wasn’t until the “tech support” stole his life savings of over $…
When you use public Wi-Fi networks, your sensitive information can be at risk. Attackers can try to capture your Wi-Fi network traffic to gather information you’re exchanging with sites on the internet. They can also try to capture key info…
Analyzing all the threat intelligence we’ve collected in the first five months of the year, Avast mobile threat researchers have been able to identify the greatest threats to Android devices in 2021. By a vast margin, the most common danger…
Nonprofit privacy activist group Fight for the Future has launched a new website that tracks the decisions of major American colleges and universities to either do away with or continue using eproctoring software – apps that, Fight for the Future claim…
How anonymous are your usernames? Do you have more than one? Few people follow username best practices. If you’re like most people, your username is some version of your real name. Maybe it’s your first initial and your last name, or maybe it has your …
If you’ve been following Amazon’s move towards having physical storefronts, you probably have seen the news about a series of different types of retail stores they have created, including bookstores, grocery stores, general merchandise stores, and shop…
Strap in, kids, because this one is going to be a doozy: This week’s What Does The Internet Know About Me? is all about Facebook and its subsidiary, Instagram. Since Zuck pretty much invented the “free” service in exchange for all of your personal info…
“Here’s how it works!” Dan Aykroyd energetically tells the SNL audience. “Catch a bass, remove the hook, and drop the bass – that’s the WHOLE bass – in the Bass-O-Matic 76!” As he says this in his best punchy announcer voice, he picks up a real fi…
A hacker forum recently leaked 8.4 billion passwords, which means you were likely affected. The anonymous poster who uploaded the compilation, dubbed “RockYou2021”, to the forum claimed it contained 82 billion passwords. However, CyberNews analyzed the…
Business Email Compromise (BEC) is a fast-growing cybersecurity threat that all businesses, especially small and medium-sized (SMB) ones, face. The FBI’s Internet Crime Complaint Center (IC3) reported in their 2020 Internet Crime Report that they field…