Tag: blog.avast.com EN

Digital Wallets And Driver’s Licenses | Avast

This article has been indexed from blog.avast.com EN One of the less publicized features of the upcoming Apple iOS 15 is the ability to add your driver’s license into your Apple Wallet. Without a doubt, it will be very convenient…

Who Can See Your Address Online? | Avast

This article has been indexed from blog.avast.com EN Finding out someone’s address used to be kind of hard — or at least took some effort. I’m old enough to remember a time when you had to grab that brick called…

Consumer Data And Privacy | Avast

This article has been indexed from blog.avast.com EN In this post, we will explain exactly why customer data is valuable and why it is so important for businesses to protect. Specifically, we’ll take a look at the kinds of data…

The Security Threat of Voice Cloning | Avast

This article has been indexed from blog.avast.com EN Advances in voice cloning have brought computer-generated audio to a level the BBC reports “is now said to be unnervingly exact” and that some experts believe may constitute a substantial security hazard.…

How To Clean Up Your Digital Footprint | Avast

This article has been indexed from blog.avast.com EN Now that you’ve read our blog entry, “What is your digital footprint?”, you know everything you share and do online is permanent and can either help or hurt your reputation. Are you…

Crypto-Based Phishing Scams | Avast

This article has been indexed from blog.avast.com EN Since the beginning of 2021, there’s been a rise in the prevalence of crypto-related phishing sites in certain parts of the world. The rise of these fraudulent sites is higher in countries…

Google FLoC | Avast

This article has been indexed from blog.avast.com EN Earlier this year, Google announced a new way for advertisers to reach consumers without using cookies to track them individually across sites and applications. Federated Learning of Cohorts (FLoC) groups an individual…

Explaining STIX And TAXII Standards | Avast

This article has been indexed from blog.avast.com EN For many years, cybersecurity companies have invested in building sensor networks and detection capabilities to build a greater understanding of adversaries’ tactics, ever-changing techniques, and the threats posed to the world’s internet…

Processing Machine Data With Machine Learning | Avast

This article has been indexed from blog.avast.com EN This post was written by the following Avast researchers: Petr Somol, Avast Director AI Research Tomáš Pevný, Avast Principal AI Scientist Viliam Lisý, Avast Principal AI Scientist Branislav Bošanský, Avast Principal AI…

Kaseya And PrintNightmare Vulnerabilities | Avast

This article has been indexed from blog.avast.com EN “It never rains but it pours.” It’s the saying that describes situations in which several bad things happen at once, and these situations are ones that security incident teams know well. In…

Twitter Considers New Security Features | Avast

This article has been indexed from blog.avast.com EN Twitter People Experience Designer Lena Emara tweeted 4 new Twitter security feature concepts, asking users for feedback on whether or not they should move into development. “Privacy is one of those things…

What Is Your Digital Footprint? | Avast

This article has been indexed from blog.avast.com EN If you’re active online, you have a digital footprint. Everyone does. Every comment made on social media, every news article shared, and every purchase made online contributes to a person’s data trail.…

Dealing With Data Brokers | Avast

This article has been indexed from blog.avast.com EN In our earlier stories about data brokers, we told you why it’s important to be aware of the data that’s being collected and who’s collecting it. For your own safety, you should…

Are Apple’s Privacy Features Enough? | Avast

This article has been indexed from blog.avast.com EN Apple recently announced several new privacy features, which is wonderful news. As more and more of our lives become digital, consumer privacy is becoming increasingly important — and many of these new…

Digging Into Sextortion Emails | Avast

This article has been indexed from blog.avast.com EN Y’all — I’ve been blackmailed. But I’m going to come clean, here, to you — the Avast readership — so that the blackmailer will no longer have power over me. Get ready,…

U.S. Senate Probe Reveals Data Purchases | Avast

This article has been indexed from blog.avast.com EN Responding to an inquiry from U.S. Senator Ron Wyden, several ad tech companies provided lists of the foreign firms, including some based in Russia and China, that purchase sensitive data on millions…

Your Internet History Isn’t Private | Avast

This article has been indexed from blog.avast.com EN Is someone watching you right now? You bet. While it’s improbable that someone is staring at you through your computer’s camera this very second, it’s entirely a fact that every move you…

Fighting Unpredictable Existential Threats | Avast

This article has been indexed from blog.avast.com EN Earlier in June, CogX Festival brought together representatives from business and government to discuss innovation. It was a follow-on to a 2019 event sponsored by several partners including Accenture, BT and Visa.…

Tech Support Fraud | Avast

This article has been indexed from blog.avast.com EN This post was written by Alexej Savcin and Michal Stanek. When Jamil Qandah got a call from Avast tech support, he had no reason to think that it wasn’t really us calling.…

Smart VPN Mode | Avast

This article has been indexed from blog.avast.com EN When you use public Wi-Fi networks, your sensitive information can be at risk. Attackers can try to capture your Wi-Fi network traffic to gather information you’re exchanging with sites on the internet.…