The Authentication Puzzle

Producing a secure authentication process that keeps users happy is easier said than done, but it's necessary in order to keep them safe online.

3 Jul 2020 min read

Over 130M records from recent data breaches for sale

Plus, more newsbytes of the week including a ransom for over a million dollars and a 33-year-old fraud king

3 Jul 2020 min read

The five biggest web threats to your managed networks

Part 3: Understanding how encrypted traffic inspection plays a key defense

1 Jul 2020 min read

How the BlueLeaks data breach happened

The massive breach of law enforcement data called BlueLeaks could have been prevented with the right security tools.

30 Jun 2020 min read

How to set up a server for a small or mid-sized business

Everything you need to know about how to set up a network and server for your small business. From installing windows to creating a server room in your office.

29 Jun 2020 min read

Google pulls 106 malicious Chrome extensions

Plus, more newsbytes of the week including an iOS flaw and Twitter billing leak

26 Jun 2020 min read

The anatomy of a phish

Understanding different types of phishing attacks and the different triggers cybercriminals use to trick users into falling for it.

26 Jun 2020 min read

What moving into the 5G era means for service providers

Avast’s Sean Obrey speaks to Light Reading’s Phil Harvey to discuss the 5G landscape and how cybersecurity is important for service providers

25 Jun 2020 min read

The 3 ways encrypted web traffic can wreak havoc for your managed security business

Part 2: Understanding SSL/TLS encrypted attack vectors

24 Jun 2020 min read

HiddenAds campaign on Play Store with 15M+ downloads discovered by Avast

Avast researchers discover 47 apps on Play Store with intrusive ads and stealth features.

23 Jun 2020 min read

Smart home security solved with a word

And that word is “microsegmentation”

23 Jun 2020 min read

Garry on Lockdown – Episode 2

Author and Lecturer Molly McKew joins Garry to explain misinformation, disinformation, and how to stem the flow of each

22 Jun 2020 min read

Understanding air gaps and how to better secure your computers

Air gaps aren’t a fool proof way to keep your computer secure. Learn how to protect your most sensitive information

22 Jun 2020 min read
--> -->