Last summer, we wrote about a major international investigation of the NSO Group and its Pegasus spyware. We described how it works and what you can do to protect your phone. NSO has gone through some difficult times as a result of that analys…
Five tech media companies – Google, Meta, TikTok, Amazon, and Twitter – have agreed to sign up for the Aotearoa New Zealand Code of Practice for Online Safety and Harms, a voluntary move in which all five pledge to self-regulate their platform…
Earlier this summer, Avast Threat Labs researchers discovered a zero-day vulnerability in Google Chrome when it was utilized in attacks on Avast users in the Middle East. The attacks were highly targeted and, in Lebanon, focused on journalists…
The past decade has seen a rise in personal crowdfunding, with people raising money online for everything from school supplies to medical bills to funeral expenses. The appeals go out on social media, imploring friends, families, and acquainta…
Magecart, the notorious credit card stealing cybercrime syndicate, is once again in the news. We last wrote about it last summer, where it compromises Magento shopping cart software pages to steal credit card information. That post had a long …
Let me present a thought experiment: Imagine you are a dissident fighting for democracy in Venezuela. The government controls access to financial services through state institutions. Those loyal to the regime have access to the nation’s scant …
Amazon is taking legal action against the administrators of more than 10,000 Facebook groups that generate fake reviews for Amazon products. The phony reviews appeared on Amazon marketplaces across the US, UK, Germany, France, Italy, Spain, an…
Earlier this year, the Indian government announced new legislation which requires virtual private network (VPN) operators to store user data for a period of five years as part of a crackdown on digital privacy rights. Nonetheless, Avast contin…
The next time someone sends you an email with a PDF attachment, take a moment before clicking to open it. While most PDF files are benign, hackers have recently been using PDFs in new and very lethal ways.
Currently in beta and expected to ship in the fall, Apple’s new Lockdown Mode removes certain features and functionalities from iPhones, iPads, and other macOS-powered devices in order to neutralize zero-click exploits. The mode blocks incomin…