Those of you who have been playing along with the Avast Privacy Refresh for the past few weeks know that we’ve worked together to take back some control of our data from Facebook, Instagram, and TikTok. Each week, I’ve given you a simple, less than fiv…
As part of our commitment to continuous improvement, we’re happy to announce that Policies in the Avast Business Management Consoles is getting a makeover. Configuring and managing policies for all your business devices is about to get easier than ever…
Many of us will be spending time away from our family members this holiday season, even with Covid-19 vaccines on the horizon. Not being able to see grandchildren or nieces and nephews will be especially heartbreaking for older family members. And, unf…
A 34-year-old hacking law called the Computer Fraud and Abuse Act (CFAA) sits at the center of a U.S. Supreme Court hearing where the defense insists the law was too vaguely written. Nathan van Buren, a former Georgia police officer, is on trial for al…
The hacker’s forum called OGUsers has ironically been a tempting target for criminals, with a series of at least three successful hacking attempts in the past couple of years: Once in May 2019, a second time in March 2020, and a third time just la…
2020 has been defined by the Covid-19 virus affecting the entire world, both online and offline. Our team has observed cybercriminals using the pandemic to their advantage, spreading scams and phishing attacks to exploit people’s weaknesses during tryi…
If there’s been one big winner of lockdown, it’s TikTok. One of the newest — and certainly most successful — social media apps to hit the scene, the app went from relative obscurity to household name as people found themselves stuck inside. Bored and w…
Remember Mirai? This four-year old botnet was the scourge of the internet and used as the launching pad for numerous DDoS attacks. Back in 2016, the botnet disrupted a German ISP, Liberia’s entire internet connection, the Dyn.com DNS services (now owne…
In an effort to staunch the flow of misinformation and disinformation surrounding the U.S. presidential election results, Facebook has tweaked its News Feed algorithm to pull more postings than usual from mainstream news sources like The New York Times…
Put simply, most people believe that the weakest link in the security supply chain is the user. This attitude has become so widely accepted that it’s almost set in stone. It is justified by the inherent unpredictability of humans; the knowledge that a …