Tag: blog.avast.com EN

10 blind spots in your SMB’s cyber defense

Many organizations struggle with developing the right strategy to keep their business protected and also achieve a defense that is cyber resilient.  This article has been indexed from blog.avast.com EN Read the original article: 10 blind spots in your SMB’s…

Defending digital freedom in times of cyberwar

From Austin to Paris, and then from Paris to Toronto, I joined Ondrej Vlcek, back then Avast’s CEO and today President at NortonLifeLock, at my third conference (and country) in three weeks. Speaking with Ondrej at Collision has become a…

GTA 6: Massive footage leak

This week, in one of the biggest leaks in videogame history, a GTAForums user by the name of “teapotuberhacker” posted 90 videos from a test build of Grand Theft Auto 6. Gameplay scenes include a waffle shop robbery, some Vice…

How Uber was hacked — again

Last week, an 18-year old hacker used social engineering techniques to compromise Uber’s network. He compromised an employee’s Slack login and then used it to send a message to Uber employees announcing that it had suffered a data breach. Uber…

Is Free Wi-Fi Really Safe? | Avast

You’re on the move and you notice that you have no bars on your phone. You do a quick skim of your Wi-Fi choices and hook into whichever one seems open, free, and not shady. Voila — you now have…

How Uber was hacked — again

Last week, an 18-year old hacker used social engineering techniques to compromise Uber’s network. He compromised an employee’s Slack login and then used it to send a message to Uber employees announcing that it had suffered a data breach. Uber…

Out-of-date medical devices could be leaving you vulnerable

Last week, the FBI’s Internet Crime Complaint Center issued a public warning claiming that they have “identified an increasing number of vulnerabilities posed by unpatched medical devices.” They stated that these devices, such as insulin pumps and pacemakers, are running…

Is Free Wi-Fi Really Safe? | Avast

You’re on the move and you notice that you have no bars on your phone. You do a quick skim of your Wi-Fi choices and hook into whichever one seems open, free, and not shady. Voila — you now have…

Autonomous stores could change the retail game

Chris Hartman, senior director of fuels, forecourt, advertising, and construction at convenience store chain Rutter’s believes that autonomous stores may be the next big thing in retail tech. Autonomous stores function without a human cashier and offer their customers easy…

Ransomware: 3 ways to protect your business

A string of recent articles has identified ransomware as the world’s greatest cybersecurity threat, especially with groups like Black Basta offering ransomware as a service. As of late June, Black Basta alone had struck nearly 50 victims with a strain…

Is your phone Safe For Scrollers (SFS)?

Shan Boodram — certified sexologist, intimacy educator, podcast host, and all around sex education star — knows a thing or two about sending sexy selfies. With a touring musician for a partner, nudes have become an important part of her…

Back to school: Top tips and tricks

The teachers have started teaching, and the students have started learning. Another school year is launched, and this year, there are more education apps than ever before. This generation of students has gone from in-classroom teaching to online learning to…

Ransomware’s rise: What can be done about it

A new report by John Sakellariadis for the Atlantic Council takes a deeper dive into the rise of ransomware over the past decade and is worth reading by managers looking to understand this marketplace. This article has been indexed from…

French tax office uses AI to find swimming pools

Using an AI computer vision system in conjunction with Google’s cloud processing, the French tax office has identified 20,356 residential swimming pools that had previously gone undeclared. As a result, the tax office was able to bring in an additional…

Enabling Global-Scale Digital Trust | Avast

Avast has joined the Trust Over IP Foundation (ToIP), Decentralized Identity Foundation (DIF), the World Wide Web Consortium (W3C), and the FIDO Alliance. These community-driven open standards organizations are developing the foundations for decentralized digital trust infrastructure. This article has…

Block YouTube On School Devices | Avast

I love YouTube. Whenever I need to learn how to fix something or want to learn to make something new in the kitchen, I turn to its endless videos.  This article has been indexed from blog.avast.com EN Read the original…

Millennials and Online Scams | Avast

When you picture someone getting scammed online, who do you picture? Maybe a grandparent, like Phyllis, who was robbed of $20,000 via a tech support scam. And while elderly people are absolutely at risk of being targeted by scammers, a…

Apple flaws put company networks at risk

Last week, Apple found two zero-day vulnerabilities in both iOS 15.6.1 and iPadOS 15.6.1 that hackers may have actively exploited to gain access to corporate networks, according to at least one report. The first vulnerability enables a hacker to execute…

Back to school shopping cybersecurity 101

Tablets, smartphones, laptops, adapters and Bluetooth devices weren’t always on back-to-school shopping lists.  But there’s no way around the fact that technology is a much bigger part of our childrens’ lives than it was for most of us when we…

Fitbit’s having a bad summer

A string of technical trouble has been plaguing Fitbit – and more specifically, Fitbit users – throughout the summer. On Tuesday this week, Fitbit Charge 5 owners found it impossible to sync their devices to both Android and iOS systems due…

Improve Your Middle Schooler’s Digital Literacy | Avast

New transitions sometimes bring new schools and friends. Enter middle school. Tweens are constantly navigating digital dilemmas. As your Middle Schooler becomes a more confident internet user, it’s important to continue having conversations about online safety and privacy.  This article…

Comparing Twilio and Slack breach responses

We recently learned about major security breaches at two tech companies, Twilio and Slack. The manner in which these two organizations responded is instructive, and since both of them published statements explaining what happened, it’s interesting to observe the differences…

Avoid the worst of the internet with cyber hygiene

Nearly everyone is concerned about their security and privacy, both online and offline. Ever since personal computing became a thing, people have become increasingly better at using PCs to be more productive, better informed, or entertained.  This article has been…

Pay with just your palm at Whole Foods

Amazon is rolling out its Amazon One payment service to 65 Whole Foods stores in California. The service uses high-tech checkout devices that allow customers to pay simply by scanning their palms. Customers sign up for Amazon One by registering…

Digital milestones for elementary schoolers

The internet is a vital part of kids’ lives today. They see grown-ups and older kids going online with all kinds of devices and they want to be a part of that world, too. Whether it’s playing games or attending…

Dave Piscitello in the Fight Against Phishing | Avast

Dave Piscitello has been involved in the internet for more than four decades and has worked tirelessly toward improving overall security and operations, both as an independent consultant as well as a major figure in various organizations. His current work,…

Why is device protection for kids valuable?

Out of the 7 million enterprise malware reports that Microsoft had in the last 30 days, over 81% came from education. The next closest industry is retail and consumer goods, at just 9%. This article has been indexed from blog.avast.com…

Phishing attack adds pressure with countdown clock

A new phishing attack tries to panic users into entering their company email login credentials by displaying a countdown clock that supposedly shows how much time remains before their account is deleted. When the time runs out, nothing actually happens,…

Small business growth in 2022: 7 effective strategies

Small businesses are the backbone of the economy. In fact, according to the Small Business Administration (SBA), they account for more than half of all private sector jobs in the United States. After weathering the storm of the pandemic, 2022…

Prepare for a Hacking Incident | Avast

The initial phases of a breach are often the most critical: The intruder is counting on your confusion, your lack of a plan or a clear chain of authority, and any early missteps. Given that it’s only a matter of…

NSO Pegasus Spyware Developments | Avast

Last summer, we wrote about a major international investigation of the NSO Group and its Pegasus spyware. We described how it works and what you can do to protect your phone. NSO has gone through some difficult times as a…

eIDAS 2.0 Developments | Avast

eIDAS (electronic Identification, Authentic and trust Services) 2.0 continues to move swiftly. Avast recently teamed up with the Intesi Group to co-host a webinar informing the public on the latest developments of the effort. This article has been indexed from…

The SMB Guide to Cyber Resilience | Avast

Cybersecurity is a subject on the minds of many business owners these days. Stories of serious customer data breaches are becoming almost routine. This article has been indexed from blog.avast.com EN Read the original article: The SMB Guide to Cyber Resilience…

Candiru: Attack targeting journalists in the Middle East

Earlier this summer, Avast Threat Labs researchers discovered a zero-day vulnerability in Google Chrome when it was utilized in attacks on Avast users in the Middle East. The attacks were highly targeted and, in Lebanon, focused on journalists. The remainder…

New Magecart campaigns target online ordering sites

Magecart, the notorious credit card stealing cybercrime syndicate, is once again in the news. We last wrote about it last summer, where it compromises Magento shopping cart software pages to steal credit card information. That post had a long list…

Patching: Why it’s important for businesses

We’ve often made recommendations about patching your systems. Patching is a simple concept to explain: Keeping all your various digital components (hardware, software, and networking infrastructure) up to date with the most recent versions. However, it can be easier said…

Lockdown Mode: Apple is shutting down spyware

Currently in beta and expected to ship in the fall, Apple’s new Lockdown Mode removes certain features and functionalities from iPhones, iPads, and other macOS-powered devices in order to neutralize zero-click exploits. The mode blocks incoming invitations and service requests,…

Digital break-up kit: Raising tech abuse awareness

Tech abuse involves much more than sharing passwords. It can be anything from unwanted messages, spyware or stalkerware being installed on devices, to controlling or harassing someone via home tech. This article has been indexed from blog.avast.com EN Read the…

Avast Pride 2022

June was Pride Month, and all month long we celebrated and honored the themes of diversity and inclusion. We kicked it off with our company-wide D&I Download newsletter, in which we reminded Avastians the month is not just a time…

Macro-based malware: A new way to fight it

Malware-infected Microsoft Office macros have been around for close to three decades. These exploits involve inserting code into a seemingly innocuous Word or Excel macro, which is then downloaded by an unsuspecting user by clicking on a phishing lure or…

How to Safely Make Online Friends | Avast

Over the past few years, classrooms have moved to kitchens and bedrooms and playgrounds have been replaced by online video games. The methods for making friends have forever been altered. Internet friendships are often more common than real-world relationships. And…

Medical scams: Educate yourself and your loved ones

We’ve covered the dangers and necessary defenses against various scams, including romance scams, supply chain scams, financial scams, lottery scams, and vishing scams, but now we turn our attention to what could be the most personal and invasive of scams…

DIDs approved to W3C recommendation

Yesterday was a major milestone in the evolution of the Web. The World Wide Web Consortium (W3C) announced it was overruling the objections of Apple, Google, and Mozilla and approving W3C Decentralized Identifiers (DIDs) 1.0 as a W3C Recommendation.  This…

Facial recognition in Oz

Despite concerns from privacy advocates, Australia is currently the only democracy in the world that uses facial recognition technology to aid Covid-19 containment procedures. Police ensure that Western Australian citizens are following the seven-day quarantine rule by sending periodic text…

Deepfake video call: New effort discovered

Since I wrote about the creation and weaponization of deepfake videos back in October 2020, the situation has worsened. Earlier this month, several European mayors received video calls from Vitali Klitschko, the mayor of Kyiv. These calls turned out to…

Malware-as-a-service is spreading among teens

Sometimes when you’re doing research, you stumble across something unexpected. That’s what happened to the Avast team when they were investigating ransomware. They found something that seemed like regular ransomware, but there were a few weird things that caught their…

ToddyCat claws at Asian governments

Researchers are monitoring an advanced persistent threat (APT) codenamed ToddyCat that has been linked to attacks on government and military entities in Europe and Asia since at least December 2020. Using an unknown exploit to deploy the Chopper web shell,…

The secret gay history of the modern internet

David Bohnett was born 13 years before the Stonewall Revolution, which kicked off the modern day gay civil rights movement in 1969 – and his early life tragically mirrored the struggle. His first lover took his own life because he…

Vishing scams on the rise: How to protect yourself

Vishing scams have quickly become another major security threat for people around the globe. And although Interpol has cracked down in recent days, the risk of being targeted — and falling victim — to vishing scams has reached new heights.…

Meta Bridges 2D And 3D With Crayta | Avast

This article has been indexed from blog.avast.com EN Meta CEO Mark Zuckerberg announced last week that user-generated tools like Crayta will help bridge the 2D gaming experiences on Facebook with the 3D world of the metaverse. Meta acquired Crayta last…

eIDAS 2.0 Amendments | Avast

This article has been indexed from blog.avast.com EN Avast’s views and opinion on the Draft Report on the proposal for a regulation of the European Parliament and of the Council amending Regulation (EU) No 910/2014 as regards establishing a framework…

Russian Disinformation Evolving Across the Globe | Avast

This article has been indexed from blog.avast.com EN Authors: Sadia Afroz and Vibhor Sehgal. On February 24, a conspiracy theory emerged that Russia attacked Ukraine to destroy a clandestine U.S. weapons program. This narrative, started by a QAnon follower on…

Digital wellbeing: Do free countries have more of it?

This article has been indexed from blog.avast.com EN How are you all doing out there, Internet People? According to the first ever Avast Digital Wellbeing Report, it’s a mixed bag. We wanted to analyze the relationship between a country’s freedom…

Lottery scams: Don’t be fooled

This article has been indexed from blog.avast.com EN It’s everybody’s fantasy to win the lottery, or a sweepstakes, or a fun prize like an iPad, and scammers know this. They use it to their advantage in various ploys designed to…

Karakurt data extortion group: CISA issues alert

This article has been indexed from blog.avast.com EN In a joint Cybersecurity Advisory by the FBI, the Cybersecurity and Infrastructure Security Agency (CISA), the Department of Treasury, and the Financial Crimes Enforcement Network (FinCEN), the four U.S. agencies warned businesses about…

Hacked Instagram accounts are scamming users

This article has been indexed from blog.avast.com EN Have a bunch of your friends on Instagram suddenly gotten really into crypto investing? I know mine have! It seems like everyone is out there getting rich quick — and they want…

How to prevent digital burnout

This article has been indexed from blog.avast.com EN Many of us have already come to know the perils of social media. We’ve previously written about the risks associated with heavy use of social media, diving into the effects that it…

Twitter fined $150M for selling user data

This article has been indexed from blog.avast.com EN According to a court complaint filed by the U.S. Department of Justice (DoJ), “While Twitter represented to users that it collected their telephone numbers and email addresses to secure their accounts, Twitter…

SMSFactory Android Trojan producing high costs for victims

This article has been indexed from blog.avast.com EN Avast has been tracking a wide-spread malware campaign consisting of TrojanSMS malware, which we are calling SMSFactory. SMSFactory sneakily siphons money from victims around the world, including Russia, Brazil, Argentina, Turkey, Ukraine,…

Supply chain scams pull no punches

This article has been indexed from blog.avast.com EN From one perspective, the global supply chains our industries have built all around the world are beautiful and impressive. Some are more elaborate than others, but they all act as long-distance assembly…