Business Security

The five biggest web threats to your managed networks

Part 3: Understanding how encrypted traffic inspection plays a key defense

30 June 2020 min read
Security News

How the BlueLeaks data breach happened

perex__ The massive breach of law enforcement data called BlueLeaks could have been prevented with the right security tools.

The massive breach of law enforcement data called BlueLeaks could have been prevented with the right security tools.

29 June 2020 min read
Business Security

How to setup a server for small businesses

perex__ Everything you need to know about how to set up a network and server for your small business. From installing windows to creating a server room in your office.

Everything you need to know about how to set up a network and server for your small business. From installing windows to creating a server room in your office.

29 June 2020 min read
Security News

Google pulls 106 malicious Chrome extensions

perex__ Plus, more newsbytes of the week including an iOS flaw and Twitter billing leak

Plus, more newsbytes of the week including an iOS flaw and Twitter billing leak

26 June 2020 min read
Viewpoints

The anatomy of a phish

perex__ {value=Understanding different types of phishing attacks and the different triggers cybercriminals use to trick users into falling for it.}

Understanding different types of phishing attacks and the different triggers cybercriminals use to trick users into falling for it.

26 June 2020 min read
Business Security

What moving into the 5G era means for service providers

perex__ {value=Avast’s Sean Obrey speaks to Light Reading’s Phil Harvey to discuss the 5G landscape and how cybersecurity is important for service providers}

Avast’s Sean Obrey speaks to Light Reading’s Phil Harvey to discuss the 5G landscape and how cybersecurity is important for service providers

25 June 2020 min read

Browse
Boldly

Keeping the
world safe from
cyberattacks

Learn more
Business Security

The 3 ways encrypted web traffic can wreak havoc for your managed security business

perex__ Part 2: Understanding SSL/TLS encrypted attack vectors

Part 2: Understanding SSL/TLS encrypted attack vectors

24 June 2020 min read
Threat Research

HiddenAds campaign on Play Store with 15M+ downloads discovered by Avast

perex__ Avast researchers discover 47 apps on Play Store with intrusive ads and stealth features.

Avast researchers discover 47 apps on Play Store with intrusive ads and stealth features.

23 June 2020 min read
Avast News

Smart home security solved with a word

perex__ And that word is “microsegmentation”

And that word is “microsegmentation”

23 June 2020 min read
Avast News

Garry on Lockdown – Episode 2

perex__ Author and Lecturer Molly McKew joins Garry to explain misinformation, disinformation, and how to stem the flow of each

Author and Lecturer Molly McKew joins Garry to explain misinformation, disinformation, and how to stem the flow of each

22 June 2020 min read
Security News

Understanding air gaps and how to better secure your computers

perex__ Air gaps aren’t a fool proof way to keep your computer secure. Learn how to protect your most sensitive information

Air gaps aren’t a fool proof way to keep your computer secure. Learn how to protect your most sensitive information

22 June 2020 min read
Avast News

Ondrej and Garry Take the Virtual Stage at Collision

perex__ Avast CEO Ondrej Vlcek and Avast Security Ambassador Garry Kasparov speak to the industry about privacy at next week’s tech conference

Avast CEO Ondrej Vlcek and Avast Security Ambassador Garry Kasparov speak to the industry about privacy at next week’s tech conference

20 June 2020 min read