<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>blog.avast.com EN</title>
    <link>https://blog.avast.com</link>
    <description />
    <language>en</language>
    <pubDate>Wed, 07 Feb 2024 14:00:00 GMT</pubDate>
    <dc:date>2024-02-07T14:00:00Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Malicious PDFs, deepfakes, and romance scams were just some of the 10 billion cyber attacks we saw last year</title>
      <link>https://blog.avast.com/avast-q4-2023-threat-report</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.avast.com/avast-q4-2023-threat-report" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.avast.com/hubfs/Avast%20Q4%202023%20threat%20report.jpg" alt="Malicious PDFs, deepfakes, and romance scams were just some of the 10 billion cyber attacks we saw last year" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;If you've been hoping that cyber attacks were on the decline, brace yourself for a reality check: 2023 was an unprecedented year in cyber threats. We witnessed more than &lt;a href="https://decoded.avast.io/threatresearch/avast-q4-2023-threat-report/"&gt;&lt;span&gt;10 billion attacks&lt;/span&gt;&lt;/a&gt; , shattering previous records. This isn't just another number; it's a wake-up call about the boldness and craftiness of today's cybercriminals.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.avast.com/avast-q4-2023-threat-report" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.avast.com/hubfs/Avast%20Q4%202023%20threat%20report.jpg" alt="Malicious PDFs, deepfakes, and romance scams were just some of the 10 billion cyber attacks we saw last year" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;If you've been hoping that cyber attacks were on the decline, brace yourself for a reality check: 2023 was an unprecedented year in cyber threats. We witnessed more than &lt;a href="https://decoded.avast.io/threatresearch/avast-q4-2023-threat-report/"&gt;&lt;span&gt;10 billion attacks&lt;/span&gt;&lt;/a&gt; , shattering previous records. This isn't just another number; it's a wake-up call about the boldness and craftiness of today's cybercriminals.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4650993&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.avast.com%2Favast-q4-2023-threat-report&amp;amp;bu=https%253A%252F%252Fblog.avast.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Threat Research</category>
      <pubDate>Wed, 07 Feb 2024 14:00:00 GMT</pubDate>
      <author>avastblog@avast.com (Emma McGowan)</author>
      <guid>https://blog.avast.com/avast-q4-2023-threat-report</guid>
      <dc:date>2024-02-07T14:00:00Z</dc:date>
    </item>
    <item>
      <title>How to spot the bad actors this awards season</title>
      <link>https://blog.avast.com/how-to-spot-the-bad-actors-this-awards-season</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.avast.com/how-to-spot-the-bad-actors-this-awards-season" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.avast.com/hubfs/bad%20actors%20%281%29.jpg" alt="How to spot the bad actors this awards season" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Lights, camera, action! Award season is a time to celebrate the shows, the crews, and, of course, the performers. But for these actors, their stage is the world of cybersecurity, where they put on the most thrilling performances of the year.&amp;nbsp; As we roll out the red carpet, it's time to shine a spotlight on a different kind of actor: the bad actors of the digital realm.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.avast.com/how-to-spot-the-bad-actors-this-awards-season" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.avast.com/hubfs/bad%20actors%20%281%29.jpg" alt="How to spot the bad actors this awards season" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Lights, camera, action! Award season is a time to celebrate the shows, the crews, and, of course, the performers. But for these actors, their stage is the world of cybersecurity, where they put on the most thrilling performances of the year.&amp;nbsp; As we roll out the red carpet, it's time to shine a spotlight on a different kind of actor: the bad actors of the digital realm.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4650993&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.avast.com%2Fhow-to-spot-the-bad-actors-this-awards-season&amp;amp;bu=https%253A%252F%252Fblog.avast.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>online scam</category>
      <category>scam</category>
      <pubDate>Mon, 05 Feb 2024 15:00:00 GMT</pubDate>
      <author>avastblog@avast.com (Emma McGowan)</author>
      <guid>https://blog.avast.com/how-to-spot-the-bad-actors-this-awards-season</guid>
      <dc:date>2024-02-05T15:00:00Z</dc:date>
    </item>
    <item>
      <title>The Taylor Swift deepfake porn is nothing new – but that doesn’t mean we shouldn’t be concerned</title>
      <link>https://blog.avast.com/taylor-swift-deepfake-porn</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.avast.com/taylor-swift-deepfake-porn" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.avast.com/hubfs/iphone-low-power-mode-hack.jpg" alt="The Taylor Swift deepfake porn is nothing new – but that doesn’t mean we shouldn’t be concerned" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;In a recent unsettling turn of events, AI-generated &lt;a href="https://www.theverge.com/2024/1/25/24050334/x-twitter-taylor-swift-ai-fake-images-trending"&gt;explicit images of the renowned singer Taylor Swift&lt;/a&gt; have flooded X (formerly Twitter), illustrating the darker side of AI capabilities. These images, believed to be created using Microsoft Designer, garnered widespread attention and highlighted the ever-growing challenge of AI-generated fake pornography.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.avast.com/taylor-swift-deepfake-porn" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.avast.com/hubfs/iphone-low-power-mode-hack.jpg" alt="The Taylor Swift deepfake porn is nothing new – but that doesn’t mean we shouldn’t be concerned" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;In a recent unsettling turn of events, AI-generated &lt;a href="https://www.theverge.com/2024/1/25/24050334/x-twitter-taylor-swift-ai-fake-images-trending"&gt;explicit images of the renowned singer Taylor Swift&lt;/a&gt; have flooded X (formerly Twitter), illustrating the darker side of AI capabilities. These images, believed to be created using Microsoft Designer, garnered widespread attention and highlighted the ever-growing challenge of AI-generated fake pornography.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4650993&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.avast.com%2Ftaylor-swift-deepfake-porn&amp;amp;bu=https%253A%252F%252Fblog.avast.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>#AI</category>
      <pubDate>Tue, 30 Jan 2024 22:17:50 GMT</pubDate>
      <author>avastblog@avast.com (Emma McGowan)</author>
      <guid>https://blog.avast.com/taylor-swift-deepfake-porn</guid>
      <dc:date>2024-01-30T22:17:50Z</dc:date>
    </item>
    <item>
      <title>That new X cryptocurrency? It's a scam.</title>
      <link>https://blog.avast.com/x-cryptocurrency-scam</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.avast.com/x-cryptocurrency-scam" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.avast.com/hubfs/tax-scam.jpg" alt="That new X cryptocurrency? It's a scam." class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;In the dynamic landscape of online scams, our Avast team has identified a new and bold scam, using the likeness of Elon Musk. This quarter, we uncovered advertisements featuring Musk to promote a supposed new cryptocurrency. The irony is striking – these ads were paid for and displayed on a platform owned by Musk himself, creating a deceptive endorsement loop.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.avast.com/x-cryptocurrency-scam" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.avast.com/hubfs/tax-scam.jpg" alt="That new X cryptocurrency? It's a scam." class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;In the dynamic landscape of online scams, our Avast team has identified a new and bold scam, using the likeness of Elon Musk. This quarter, we uncovered advertisements featuring Musk to promote a supposed new cryptocurrency. The irony is striking – these ads were paid for and displayed on a platform owned by Musk himself, creating a deceptive endorsement loop.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4650993&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.avast.com%2Fx-cryptocurrency-scam&amp;amp;bu=https%253A%252F%252Fblog.avast.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>online scam</category>
      <category>scam</category>
      <pubDate>Thu, 25 Jan 2024 16:00:00 GMT</pubDate>
      <author>avastblog@avast.com (Luis Corrons)</author>
      <guid>https://blog.avast.com/x-cryptocurrency-scam</guid>
      <dc:date>2024-01-25T16:00:00Z</dc:date>
    </item>
    <item>
      <title>Uncovering the hidden superpowers of your smartphone</title>
      <link>https://blog.avast.com/uncovering-the-hidden-superpowers-of-your-smartphone</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.avast.com/uncovering-the-hidden-superpowers-of-your-smartphone" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.avast.com/hubfs/smartphone%20super%20powers.jpg" alt="Uncovering the hidden superpowers of your smartphone" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;Picture this: You've just dashed out of your favorite café, already late for a meeting, when that heart-sinking realization hits you: your phone isn't in your pocket where it should be. Panic kicks in. Or maybe you're entering your card details for an online purchase, a little voice in your head whispering, "Is this actually safe?" In moments like these, your smartphone isn't just a gadget; it's like a superhero hiding in plain sight, ready to leap into action.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.avast.com/uncovering-the-hidden-superpowers-of-your-smartphone" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.avast.com/hubfs/smartphone%20super%20powers.jpg" alt="Uncovering the hidden superpowers of your smartphone" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;Picture this: You've just dashed out of your favorite café, already late for a meeting, when that heart-sinking realization hits you: your phone isn't in your pocket where it should be. Panic kicks in. Or maybe you're entering your card details for an online purchase, a little voice in your head whispering, "Is this actually safe?" In moments like these, your smartphone isn't just a gadget; it's like a superhero hiding in plain sight, ready to leap into action.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4650993&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.avast.com%2Funcovering-the-hidden-superpowers-of-your-smartphone&amp;amp;bu=https%253A%252F%252Fblog.avast.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Tue, 23 Jan 2024 21:29:40 GMT</pubDate>
      <author>avastblog@avast.com (Emma McGowan)</author>
      <guid>https://blog.avast.com/uncovering-the-hidden-superpowers-of-your-smartphone</guid>
      <dc:date>2024-01-23T21:29:40Z</dc:date>
    </item>
    <item>
      <title>Your data is under siege. Here’s how to win the war.</title>
      <link>https://blog.avast.com/your-data-is-under-siege.-heres-how-to-win-the-war</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.avast.com/your-data-is-under-siege.-heres-how-to-win-the-war" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.avast.com/hubfs/identity-privacy.jpg" alt="Your data is under siege. Here’s how to win the war." class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;I consider myself pretty savvy when it comes to protecting my personal data. But last year I nearly fell for a phone scam from someone purporting to be an IRS agent. In my own defense, it was an impressively creative scam. It was also a reminder that there is no limit to the ingenuity thieves will employ in their quest to steal nuggets of personal information. &lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.avast.com/your-data-is-under-siege.-heres-how-to-win-the-war" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.avast.com/hubfs/identity-privacy.jpg" alt="Your data is under siege. Here’s how to win the war." class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;I consider myself pretty savvy when it comes to protecting my personal data. But last year I nearly fell for a phone scam from someone purporting to be an IRS agent. In my own defense, it was an impressively creative scam. It was also a reminder that there is no limit to the ingenuity thieves will employ in their quest to steal nuggets of personal information. &lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4650993&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.avast.com%2Fyour-data-is-under-siege.-heres-how-to-win-the-war&amp;amp;bu=https%253A%252F%252Fblog.avast.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privacy</category>
      <pubDate>Sat, 20 Jan 2024 14:00:00 GMT</pubDate>
      <author>avastblog@avast.com (Emma McGowan)</author>
      <guid>https://blog.avast.com/your-data-is-under-siege.-heres-how-to-win-the-war</guid>
      <dc:date>2024-01-20T14:00:00Z</dc:date>
    </item>
    <item>
      <title>The hidden costs of pirated software: A cautionary tale for small businesses</title>
      <link>https://blog.avast.com/the-hidden-costs-of-pirated-software</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.avast.com/the-hidden-costs-of-pirated-software" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.avast.com/hubfs/PirateBlog_011024.png" alt="The hidden costs of pirated software: A cautionary tale for small businesses" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;By Luis Corrons (Avast Security Evangelist) and Matěj Krčma (Avast Malware Analyst)&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;In today's economy, small businesses face an array of challenges, from managing costs to staying competitive. As they navigate these waters, some are tempted to take shortcuts that promise cost savings. One such shortcut is the use of pirated software, a decision that can have far-reaching consequences. This article takes a deep dive into the hidden dangers of this practice, illustrated by a real-life incident from a company in the construction industry.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.avast.com/the-hidden-costs-of-pirated-software" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.avast.com/hubfs/PirateBlog_011024.png" alt="The hidden costs of pirated software: A cautionary tale for small businesses" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;By Luis Corrons (Avast Security Evangelist) and Matěj Krčma (Avast Malware Analyst)&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;In today's economy, small businesses face an array of challenges, from managing costs to staying competitive. As they navigate these waters, some are tempted to take shortcuts that promise cost savings. One such shortcut is the use of pirated software, a decision that can have far-reaching consequences. This article takes a deep dive into the hidden dangers of this practice, illustrated by a real-life incident from a company in the construction industry.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4650993&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.avast.com%2Fthe-hidden-costs-of-pirated-software&amp;amp;bu=https%253A%252F%252Fblog.avast.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>business security</category>
      <pubDate>Thu, 18 Jan 2024 23:00:00 GMT</pubDate>
      <guid>https://blog.avast.com/the-hidden-costs-of-pirated-software</guid>
      <dc:date>2024-01-18T23:00:00Z</dc:date>
      <dc:creator>Avast Threat Labs</dc:creator>
    </item>
    <item>
      <title>Safeguard your heart and personal info this cuffing season</title>
      <link>https://blog.avast.com/cuffing-season-scams</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.avast.com/cuffing-season-scams" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.avast.com/hubfs/avast-blog/love-4888774_1920.jpg" alt="Safeguard your heart and personal info this cuffing season" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;You may be searching for your soulmate, a low-risk situationship (we don’t judge), or just a suitable date to the wedding you’re invited to next month. Whatever the reason, many of us are on the lookout for love this time of year.&amp;nbsp;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.avast.com/cuffing-season-scams" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.avast.com/hubfs/avast-blog/love-4888774_1920.jpg" alt="Safeguard your heart and personal info this cuffing season" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;You may be searching for your soulmate, a low-risk situationship (we don’t judge), or just a suitable date to the wedding you’re invited to next month. Whatever the reason, many of us are on the lookout for love this time of year.&amp;nbsp;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4650993&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.avast.com%2Fcuffing-season-scams&amp;amp;bu=https%253A%252F%252Fblog.avast.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>scams</category>
      <pubDate>Fri, 12 Jan 2024 20:07:17 GMT</pubDate>
      <author>avastblog@avast.com (Emma McGowan)</author>
      <guid>https://blog.avast.com/cuffing-season-scams</guid>
      <dc:date>2024-01-12T20:07:17Z</dc:date>
    </item>
    <item>
      <title>Avast researchers detect a surge in fake e-shops following holidays</title>
      <link>https://blog.avast.com/avast-researchers-detect-surge-in-fake-e-shops</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.avast.com/avast-researchers-detect-surge-in-fake-e-shops" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.avast.com/hubfs/online%20shopping%20fake%20e%20shops.jpg" alt="Avast researchers detect a surge in fake e-shops following holidays" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;As the festive season wraps up, a new challenge emerges for online shoppers: the rise of over 4,000 &lt;a href="https://blog.avast.com/rise-of-fake-eshops"&gt;counterfeit e-shops&lt;/a&gt;. These fraudulent sites, cunningly designed to mimic popular brands, exploit the post-Christmas shopping enthusiasm. Their realistic appearances make them nearly indistinguishable from legitimate websites, posing a significant risk to unsuspecting consumers. Notable among these deceitful domains are sites like: &lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.avast.com/avast-researchers-detect-surge-in-fake-e-shops" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.avast.com/hubfs/online%20shopping%20fake%20e%20shops.jpg" alt="Avast researchers detect a surge in fake e-shops following holidays" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;As the festive season wraps up, a new challenge emerges for online shoppers: the rise of over 4,000 &lt;a href="https://blog.avast.com/rise-of-fake-eshops"&gt;counterfeit e-shops&lt;/a&gt;. These fraudulent sites, cunningly designed to mimic popular brands, exploit the post-Christmas shopping enthusiasm. Their realistic appearances make them nearly indistinguishable from legitimate websites, posing a significant risk to unsuspecting consumers. Notable among these deceitful domains are sites like: &lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4650993&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.avast.com%2Favast-researchers-detect-surge-in-fake-e-shops&amp;amp;bu=https%253A%252F%252Fblog.avast.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 04 Jan 2024 12:00:00 GMT</pubDate>
      <author>avastblog@avast.com (Branislav Kramar)</author>
      <guid>https://blog.avast.com/avast-researchers-detect-surge-in-fake-e-shops</guid>
      <dc:date>2024-01-04T12:00:00Z</dc:date>
    </item>
    <item>
      <title>Is your ID badge giving away too much about you?</title>
      <link>https://blog.avast.com/is-your-id-badge-giving-away-too-much-about-you</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.avast.com/is-your-id-badge-giving-away-too-much-about-you" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.avast.com/hubfs/id%20badge.jpg" alt="Is your ID badge giving away too much about you?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;It seemed like an innocuous thing to do. Before flying home to Australia from Japan, Tony Abbott posted a photo of his boarding pass on Instagram with a message thanking the Qantas Airlines crew. But the well-intentioned gesture triggered a minor diplomatic kerfuffle, raised airline cybersecurity concerns, and went viral.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://blog.avast.com/is-your-id-badge-giving-away-too-much-about-you" title="" class="hs-featured-image-link"&gt; &lt;img src="https://blog.avast.com/hubfs/id%20badge.jpg" alt="Is your ID badge giving away too much about you?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;It seemed like an innocuous thing to do. Before flying home to Australia from Japan, Tony Abbott posted a photo of his boarding pass on Instagram with a message thanking the Qantas Airlines crew. But the well-intentioned gesture triggered a minor diplomatic kerfuffle, raised airline cybersecurity concerns, and went viral.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=4650993&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.avast.com%2Fis-your-id-badge-giving-away-too-much-about-you&amp;amp;bu=https%253A%252F%252Fblog.avast.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Wed, 03 Jan 2024 14:00:00 GMT</pubDate>
      <author>avastblog@avast.com (Emma McGowan)</author>
      <guid>https://blog.avast.com/is-your-id-badge-giving-away-too-much-about-you</guid>
      <dc:date>2024-01-03T14:00:00Z</dc:date>
    </item>
  </channel>
</rss>
