Consumers can lead the way in pressuring tech companies to respect security and democracy

We are now a few months into 2018 and the scope of malicious digital activities is already expanding.

21 Mar 2018 min read

The essential guide to cleaning & speeding up your Mac

Macs don’t ever slow down, don’t ever crash, and sure as rain don’t ever run out of space. Right? Wrong.

20 Mar 2018 min read

When information leaks

A vulnerability and a victory for data protection authorities are a good reminder about what can happen when data isn’t kept safe.

19 Mar 2018 min read

Five endpoint threats affecting small businesses

This cybersecurity guide aims to help small business owners protect their companies against endpoint threats by arming them with appropriate knowledge. Below is a step-by-step introduction to cybercrime followed by our list of the top five endpoint threats affecting small businesses.

19 Mar 2018 min read

Avast Named a CRN Coolest Endpoint Security Provider

Avast Business portfolio recognized for meeting SMB security needs

19 Mar 2018 min read

New Monero mining malware discovered in Google Play

Avast researchers detect covert malware affecting multiple apps

15 Mar 2018 min read

Is your smart home a secure home?

IoT devices may make our lives more convenient, but they also make our homes more vulnerable.

14 Mar 2018 min read

Greedy cybercriminals host malware on GitHub

Cryptocurrency mining malware, which also installs a malicious Chrome extension, hosted on GitHub for anyone to download.

13 Mar 2018 min read

How to manage endpoint protection without an IT department

How can you protect your small business from cyberattacks without an IT team? Read our step-by-step guide.

12 Mar 2018 min read

How to protect a small business from hackers

Make sure that you’re protecting your business against cyber threats

12 Mar 2018 min read

Time to tighten up device security

Device security has been in the news this week, including a proposal for IoT security for smart devices, a more security-focused Android, and an Uber lawsuit.

10 Mar 2018 min read

New investigations into the CCleaner incident point to a possible third stage that had keylogger capacities

Activity was found in Piriform network although not on any of the CCleaner customers’ PCs

8 Mar 2018 min read

Key trends from Mobile World Congress #MWC18

Learn the latest about smartphones, 5G, IoT, and, of course, security.

8 Mar 2018 min read
--> -->