ransomware

Reviewing An Ugly Truth | Avast




New York Times reporters Sheera Frenkel and Cecilia Kang have been covering the trials and tribulations of Facebook for the past several years, and they have used their reporting to form the basis of their new book, An Ugly Truth: Inside Fa...

Crypto Exchange Scams | Avast




You may already have won! How many scams have begun with these words? 
There is a new breed of scammers gaining popularity, thanks to the wild swings in the cryptocurrency market. Avast researcher Matěj Račinský has tracked three diff...

Tech Support Scammer Language | Avast




Have you ever gotten a call from an unknown number claiming that there’s a serious problem with your computer? It’s likely you have — these types of calls, called tech support fraud, are more common than they ever have been before. Scammers...

Cyber Shield 21 | Avast




Earlier this month, I had the unique opportunity to observe the National Guard conduct its cybersecurity exercises at Cyber Shield 21. This is perhaps the largest training effort of its kind, with more than 800 people across the U.S. taking...

Good news! I’m getting a salary increase!

It seems my boss here at “Grahamcluley” has decided that I deserve a wage increase. This is not only terrific news for my bank balance, but also terribly exciting as I never knew I even had a boss – let alone that my company had a human resources depar...

Apple Hide My Email | Avast




We’re continuing to analyze and review the upcoming privacy features which will be included in Apple’s iOS 15 and Monterey OS, which will be released later this year. As we've previously mentioned, some features will be included free of cha...

How to be safely connected while travelling?


With so many people on the go, cybercriminals are back in business, too. A quick refresher is necessary to ensure that you stay safely connected during your summer travels.
The post How to be safely connected while travelling? appeared first on Panda Security Mediacenter.

Redundancy for resilience: The importance of layered protection in the cloud

At Carbonite + Webroot, we’re always preaching about the importance of layering security solutions. Because here’s the truth: data’s always at risk. Whether from cybercriminals, everyday mishaps or mother nature, businesses can put up all the defenses they want but disaster only has to successfully strike once. The global pandemic means more work is being […]
The post Redundancy for resilience: The importance of layered protection in the cloud appeared first on Webroot Blog.

Pegasus And Spyware | Avast




Earlier in July, a group of security researchers revealed that they had been working together to uncover a widespread surveillance of journalists, politicians, government officials, chief executives, and human rights activists. The tool of ...

Smashing Security podcast #237: NuNa, NuNu, NaNa

Spy software known as Pegasus has been used to carry out surveillance on the smartphones of journalists, activists, and political leaders. Can a “Freedom Phone” be trusted? And a ransomware-hit law firm demonstrates how not to keep its cust...

Top 5 Security Tips for SMBs | Avast




I have the pleasure of leading the Avast Red Team, a specialized unit dedicated to protecting our business applications, products and network infrastructures. You could say my team is all business, literally. We keep our clients’ data safe ...

Are advertising unique IDs anonymous?


If you have apps with advertisements, you are at risk of being de-anonymized by data brokers. Here is how your confidential data could be unmasked.
The post Are advertising unique IDs anonymous? appeared first on Panda Security Mediacenter.

Digital Wallets And Driver’s Licenses | Avast




One of the less publicized features of the upcoming Apple iOS 15 is the ability to add your driver’s license into your Apple Wallet. Without a doubt, it will be very convenient to store your digital driver’s license alongside your proof of ...

Who Can See Your Address Online? | Avast




Finding out someone’s address used to be kind of hard — or at least took some effort. I’m old enough to remember a time when you had to grab that brick called the “yellow pages” to search for someone’s address. We were taught how to do it i...

How to Stop Spam Emails and Save Your Inbox


If you have an email address, chances are you’ve received a spam email before. Spam emails are unsolicited messages that may ask for monetary donations,…
The post How to Stop Spam Emails and Save Your Inbox appeared first on Panda Security Mediacenter.

Consumer Data And Privacy | Avast




In this post, we will explain exactly why customer data is valuable and why it is so important for businesses to protect. Specifically, we'll take a look at the kinds of data businesses collect, various vulnerabilities in systems, and what ...

The Security Threat of Voice Cloning | Avast




Advances in voice cloning have brought computer-generated audio to a level the BBC reports “is now said to be unnervingly exact” and that some experts believe may constitute a substantial security hazard. The AI-led technology learns and ad...

What’s the difference between high availability and backup again?

It’s not just that they’re making headlines more often. Ransomware rates really are rising. Given the recent spate of high-profile attacks, it’s worth remembering the difference between standard backup and high-availability replication. Our research suggests that the costs of ransomware for businesses can amount to much more than an extortion payment. They include lost hours […]
The post What’s the difference between high availability and backup again? appeared first on Webroot Blog.

Avast Hacker Archives Episode 8 – Dave Aitel | Avast




“I’ve always found the best way to get a kid to learn how to hack is to tell them to just never use the computer,” Dave Aitel confides to Jaya Baloo in Episode 8 of our podcast Avast Hacker Archives (AHA). Dave is speaking from experience. ...