Tag: blog.avast.com EN

Avast Threat Labs releases Q3 2022 Threat Report

Cyber threats are constant and the third quarter of 2022 was no exception. The Q3 Threat Report from Avast Threat Labs found an increase in PC adware activity, continued chaos caused by cyber criminal gangs, and an increase in ransomware…

Scary cybersecurity stories to tell in the dark

Greetings, kiddies! It’s your old pal the Vault Keeper, sneaking into the Avast Security News Team’s office after hours to pull together a decadent dinner of dark delicacies for you. I ran my bony fingers through the archives and found…

Make Your Device Run Like New Again | Avast

Are you secretly tech-challenged? Don’t be ashamed to say so –– you’re not alone. A British study involving 2,000 device owners revealed that almost 50% admit they are not very knowledgeable when it comes to resolving tech issues. Additionally, 15%…

Blue checks on the black market

Scammers are stealing verified Twitter and Instagram accounts in order to resell them on the black market to other scammers who will use them to promote NFT frauds. According to investigative reporting by The Verge, sales of these stolen accounts…

Phishing: The tip of the iceberg

Day after day, we see news about new cyberattacks: Data breaches, yet another ransomware attack, and so on. From big companies to individuals, all of us are affected by these threats. A fact that isn’t that well known is that…

Make Your Device Run Like New Again | Avast

Are you secretly tech-challenged? Don’t be ashamed to say so –– you’re not alone. A British study involving 2,000 device owners revealed that almost 50% admit they are not very knowledgeable when it comes to resolving tech issues. Additionally, 15%…

Navigating online safety at any age

The sandwich generation — which is people in their 30s and 40s who are both raising their own children and caring for aging parents — has always had a lot on its plate. And, these days, there’s a relatively new…

Facebook Account After Death | Avast

Facebook is an important part of a human’s life events. We announce the most important milestones on our timelines by sharing with our Facebook friends the joy of getting married, having babies, or moving abroad. But what will happen with…

Navigating online safety at any age

The sandwich generation — which is people in their 30s and 40s who are both raising their own children and caring for aging parents — has always had a lot on its plate. And, these days, there’s a relatively new…

Facebook Account After Death | Avast

Facebook is an important part of a human’s life events. We announce the most important milestones on our timelines by sharing with our Facebook friends the joy of getting married, having babies, or moving abroad. But what will happen with…

Cyber Awareness Quiz | Avast

Take our cyber awareness quiz and learn how you can navigate discussions with your family around  the complexities of technology and digital threats. Our goal is help you, the “sandwich generation,” keep both both aging parents and young children safe online. This…

Cyber Awareness Quiz | Avast

Take our cyber awareness quiz and learn how you can navigate discussions with your family around  the complexities of technology and digital threats. Our goal is help you, the “sandwich generation,” keep both both aging parents and young children safe online. This…

Passwords for kids: How to create and manage them

Parenting in the 2020s means lots of passwords. You have school devices. You have soccer team logins. You have Roblox and Minecraft and YouTube. Sometimes it feels like your kids have more accounts than you do! Which means it’s very,…

Passwords for kids: How to create and manage them

Parenting in the 2020s means lots of passwords. You have school devices. You have soccer team logins. You have Roblox and Minecraft and YouTube. Sometimes it feels like your kids have more accounts than you do! Which means it’s very,…

Caffeine makes phishing easy

A phishing-as-a-service (PhaaS) platform called Caffeine is unlike others in that it offers an open registration process, requiring neither invitations nor referrals, allowing anyone who registers to access all the tools one could need to launch a phishing attack. “Phishing…

Passwords for kids: How to create and manage them

Parenting in the 2020s means lots of passwords. You have school devices. You have soccer team logins. You have Roblox and Minecraft and YouTube. Sometimes it feels like your kids have more accounts than you do! Which means it’s very,…

Caffeine makes phishing easy

A phishing-as-a-service (PhaaS) platform called Caffeine is unlike others in that it offers an open registration process, requiring neither invitations nor referrals, allowing anyone who registers to access all the tools one could need to launch a phishing attack. “Phishing…

The IRS warns smishing attacks are on the rise

Smishing, or phishing carried out using SMS text messages, is once again on the rise, according to new reports from the IRS. They have warned Americans of the situation last month; this warning joins one issued by the FCC back…

The IRS warns smishing attacks are on the rise

Smishing, or phishing carried out using SMS text messages, is once again on the rise, according to new reports from the IRS. They have warned Americans of the situation last month; this warning joins one issued by the FCC back…

BeReal has some major privacy issues

There’s a new social media app in town and it’s making waves. BeReal — which launched in 2020 but didn’t really start gaining traction until midway through 2022 — encourages people to step away from the curation and filtering of…

10 blind spots in your SMB’s cyber defense

Many organizations struggle with developing the right strategy to keep their business protected and also achieve a defense that is cyber resilient.  This article has been indexed from blog.avast.com EN Read the original article: 10 blind spots in your SMB’s…

Defending digital freedom in times of cyberwar

From Austin to Paris, and then from Paris to Toronto, I joined Ondrej Vlcek, back then Avast’s CEO and today President at NortonLifeLock, at my third conference (and country) in three weeks. Speaking with Ondrej at Collision has become a…

Robocalls: FCC cracks the whip

The Federal Communications Commission (FCC) has given regional US voice service providers Akabis, Cloud4, Global UC, Horizon Technology Group, Morse Communications, Sharon Telephone Company, and SW Arkansas Telecommunications and Technology 14 days to prove they have taken action to mitigate…

BeReal has some major privacy issues

There’s a new social media app in town and it’s making waves. BeReal — which launched in 2020 but didn’t really start gaining traction until midway through 2022 — encourages people to step away from the curation and filtering of…

10 blind spots in your SMB’s cyber defense

Many organizations struggle with developing the right strategy to keep their business protected and also achieve a defense that is cyber resilient.  This article has been indexed from blog.avast.com EN Read the original article: 10 blind spots in your SMB’s…

Defending digital freedom in times of cyberwar

From Austin to Paris, and then from Paris to Toronto, I joined Ondrej Vlcek, back then Avast’s CEO and today President at NortonLifeLock, at my third conference (and country) in three weeks. Speaking with Ondrej at Collision has become a…

GTA 6: Massive footage leak

This week, in one of the biggest leaks in videogame history, a GTAForums user by the name of “teapotuberhacker” posted 90 videos from a test build of Grand Theft Auto 6. Gameplay scenes include a waffle shop robbery, some Vice…

How Uber was hacked — again

Last week, an 18-year old hacker used social engineering techniques to compromise Uber’s network. He compromised an employee’s Slack login and then used it to send a message to Uber employees announcing that it had suffered a data breach. Uber…

Is Free Wi-Fi Really Safe? | Avast

You’re on the move and you notice that you have no bars on your phone. You do a quick skim of your Wi-Fi choices and hook into whichever one seems open, free, and not shady. Voila — you now have…

How Uber was hacked — again

Last week, an 18-year old hacker used social engineering techniques to compromise Uber’s network. He compromised an employee’s Slack login and then used it to send a message to Uber employees announcing that it had suffered a data breach. Uber…

Out-of-date medical devices could be leaving you vulnerable

Last week, the FBI’s Internet Crime Complaint Center issued a public warning claiming that they have “identified an increasing number of vulnerabilities posed by unpatched medical devices.” They stated that these devices, such as insulin pumps and pacemakers, are running…

Is Free Wi-Fi Really Safe? | Avast

You’re on the move and you notice that you have no bars on your phone. You do a quick skim of your Wi-Fi choices and hook into whichever one seems open, free, and not shady. Voila — you now have…

Autonomous stores could change the retail game

Chris Hartman, senior director of fuels, forecourt, advertising, and construction at convenience store chain Rutter’s believes that autonomous stores may be the next big thing in retail tech. Autonomous stores function without a human cashier and offer their customers easy…

Ransomware: 3 ways to protect your business

A string of recent articles has identified ransomware as the world’s greatest cybersecurity threat, especially with groups like Black Basta offering ransomware as a service. As of late June, Black Basta alone had struck nearly 50 victims with a strain…

Is your phone Safe For Scrollers (SFS)?

Shan Boodram — certified sexologist, intimacy educator, podcast host, and all around sex education star — knows a thing or two about sending sexy selfies. With a touring musician for a partner, nudes have become an important part of her…

Back to school: Top tips and tricks

The teachers have started teaching, and the students have started learning. Another school year is launched, and this year, there are more education apps than ever before. This generation of students has gone from in-classroom teaching to online learning to…

Ransomware’s rise: What can be done about it

A new report by John Sakellariadis for the Atlantic Council takes a deeper dive into the rise of ransomware over the past decade and is worth reading by managers looking to understand this marketplace. This article has been indexed from…

French tax office uses AI to find swimming pools

Using an AI computer vision system in conjunction with Google’s cloud processing, the French tax office has identified 20,356 residential swimming pools that had previously gone undeclared. As a result, the tax office was able to bring in an additional…

Enabling Global-Scale Digital Trust | Avast

Avast has joined the Trust Over IP Foundation (ToIP), Decentralized Identity Foundation (DIF), the World Wide Web Consortium (W3C), and the FIDO Alliance. These community-driven open standards organizations are developing the foundations for decentralized digital trust infrastructure. This article has…

Block YouTube On School Devices | Avast

I love YouTube. Whenever I need to learn how to fix something or want to learn to make something new in the kitchen, I turn to its endless videos.  This article has been indexed from blog.avast.com EN Read the original…

Millennials and Online Scams | Avast

When you picture someone getting scammed online, who do you picture? Maybe a grandparent, like Phyllis, who was robbed of $20,000 via a tech support scam. And while elderly people are absolutely at risk of being targeted by scammers, a…

Apple flaws put company networks at risk

Last week, Apple found two zero-day vulnerabilities in both iOS 15.6.1 and iPadOS 15.6.1 that hackers may have actively exploited to gain access to corporate networks, according to at least one report. The first vulnerability enables a hacker to execute…

Back to school shopping cybersecurity 101

Tablets, smartphones, laptops, adapters and Bluetooth devices weren’t always on back-to-school shopping lists.  But there’s no way around the fact that technology is a much bigger part of our childrens’ lives than it was for most of us when we…

Fitbit’s having a bad summer

A string of technical trouble has been plaguing Fitbit – and more specifically, Fitbit users – throughout the summer. On Tuesday this week, Fitbit Charge 5 owners found it impossible to sync their devices to both Android and iOS systems due…

Improve Your Middle Schooler’s Digital Literacy | Avast

New transitions sometimes bring new schools and friends. Enter middle school. Tweens are constantly navigating digital dilemmas. As your Middle Schooler becomes a more confident internet user, it’s important to continue having conversations about online safety and privacy.  This article…

Comparing Twilio and Slack breach responses

We recently learned about major security breaches at two tech companies, Twilio and Slack. The manner in which these two organizations responded is instructive, and since both of them published statements explaining what happened, it’s interesting to observe the differences…

Avoid the worst of the internet with cyber hygiene

Nearly everyone is concerned about their security and privacy, both online and offline. Ever since personal computing became a thing, people have become increasingly better at using PCs to be more productive, better informed, or entertained.  This article has been…

Pay with just your palm at Whole Foods

Amazon is rolling out its Amazon One payment service to 65 Whole Foods stores in California. The service uses high-tech checkout devices that allow customers to pay simply by scanning their palms. Customers sign up for Amazon One by registering…

Digital milestones for elementary schoolers

The internet is a vital part of kids’ lives today. They see grown-ups and older kids going online with all kinds of devices and they want to be a part of that world, too. Whether it’s playing games or attending…

Dave Piscitello in the Fight Against Phishing | Avast

Dave Piscitello has been involved in the internet for more than four decades and has worked tirelessly toward improving overall security and operations, both as an independent consultant as well as a major figure in various organizations. His current work,…

Why is device protection for kids valuable?

Out of the 7 million enterprise malware reports that Microsoft had in the last 30 days, over 81% came from education. The next closest industry is retail and consumer goods, at just 9%. This article has been indexed from blog.avast.com…

Phishing attack adds pressure with countdown clock

A new phishing attack tries to panic users into entering their company email login credentials by displaying a countdown clock that supposedly shows how much time remains before their account is deleted. When the time runs out, nothing actually happens,…

Small business growth in 2022: 7 effective strategies

Small businesses are the backbone of the economy. In fact, according to the Small Business Administration (SBA), they account for more than half of all private sector jobs in the United States. After weathering the storm of the pandemic, 2022…

Prepare for a Hacking Incident | Avast

The initial phases of a breach are often the most critical: The intruder is counting on your confusion, your lack of a plan or a clear chain of authority, and any early missteps. Given that it’s only a matter of…

NSO Pegasus Spyware Developments | Avast

Last summer, we wrote about a major international investigation of the NSO Group and its Pegasus spyware. We described how it works and what you can do to protect your phone. NSO has gone through some difficult times as a…

eIDAS 2.0 Developments | Avast

eIDAS (electronic Identification, Authentic and trust Services) 2.0 continues to move swiftly. Avast recently teamed up with the Intesi Group to co-host a webinar informing the public on the latest developments of the effort. This article has been indexed from…

The SMB Guide to Cyber Resilience | Avast

Cybersecurity is a subject on the minds of many business owners these days. Stories of serious customer data breaches are becoming almost routine. This article has been indexed from blog.avast.com EN Read the original article: The SMB Guide to Cyber Resilience…

Candiru: Attack targeting journalists in the Middle East

Earlier this summer, Avast Threat Labs researchers discovered a zero-day vulnerability in Google Chrome when it was utilized in attacks on Avast users in the Middle East. The attacks were highly targeted and, in Lebanon, focused on journalists. The remainder…

New Magecart campaigns target online ordering sites

Magecart, the notorious credit card stealing cybercrime syndicate, is once again in the news. We last wrote about it last summer, where it compromises Magento shopping cart software pages to steal credit card information. That post had a long list…