Instagram accounts frozen with threat of ransom

Learn how to avoid falling victim to the current Instagram threat or any social attack.

3 Oct 2018 min read

Cybersecurity skills series tackles top IT security challenges

Industry experts share IT security trend data + best business practices for the channel

3 Oct 2018 min read

Ransomware attacks via RDP choke SMBs

Protect yourself and your business from this troubling new trend.

2 Oct 2018 min read

The MSP Guide to Vertical Market Success: Spotlight on healthcare

Continuing our series on vertical markets, we explore how the healthcare industry may be your ticket to MSP success.

2 Oct 2018 min read

Password! Password! get your password here!

Whenever you need a strong password, our free Random Password Generator has you covered.

2 Oct 2018 min read

Facebook security breach - what should you do? | Avast

Social media giant Facebook reported today that a data breach put 50 million users at risk. Here’s what you need to know.

29 Sep 2018 min read

San Diego shut down by ransomware

A cyberattack on the Port of San Diego suspends public services.

28 Sep 2018 min read

7 new modules for VPNFilter malware, Hide & Seek botnet targets Android, and House Oversight takes on AI

VPNFilter gets powerful updates and latest IoT botnet can now corrupt Android devices.

28 Sep 2018 min read

Torii botnet - Not another Mirai variant

New, more sophisticated IoT botnet targets a wide range of devices

27 Sep 2018 min read

The MSP Guide to Building Your Managed Security Services

Part 2: Key Pricing Strategies for Your Managed Security Services

26 Sep 2018 min read

How to manage Android app permissions

The Avast Guide to Android Apps Part 4 explains what you need to know about permissions.

26 Sep 2018 min read

All-in-one malware out, GovPayNow drops the ball on security, and more

All-in-one malware poses as ransomware, new cold-boot attack steals while your PC sleeps, 14 million government records leaked, and Newegg suffers a crack.

21 Sep 2018 min read

Cryptojacking surges and here’s what to do about it

The Microsoft Eternal Blue vulnerability turns out to be a useful tool in illicit cryptomining.

20 Sep 2018 min read
--> -->