Sections

Viewpoints

Mobile threats are everywhere – here’s what you can do

Even if your company issues you a locked-down smartphone, embracing best security practices remains vital

14 May 2019 min read

The Supply Chain; aka the Hacker Food Chain

perex__ Could you be the weak link for hackers?

Could you be the weak link for hackers?

13 May 2019 min read

Geopolitical cybersecurity comes home

perex__ There will be more and more investigations into technology originating in undemocratic states

There will be more and more investigations into technology originating in undemocratic states

9 May 2019 min read

Why Android users must remain vigilant about malicious apps

perex__

Byron Acohido sits down with with Nikolaos Chrysaidos, head of Mobile Threat Intelligence & Security at Avast Threat Labs

6 May 2019 min read

The state of things in the internet of things

perex__ {value=Security is not being designed into new smart devices because a rush to market takes precedence}

Security is not being designed into new smart devices because a rush to market takes precedence

30 April 2019 min read

Social engineering – It’s not just about phishing

perex__ {value=When deception is used to hack your mind}

When deception is used to hack your mind

14 April 2019 min read

Visit Avast website

Please, everyone, let’s not call it ‘fake news’ anymore

perex__ Digital disinformation campaigns, leveraging behavior profiling and social media, are on the rise — and causing harm.

Digital disinformation campaigns, leveraging behavior profiling and social media, are on the rise — and causing harm.

2 April 2019 min read

Routers: a vulnerable opening to your home and personal data

perex__ If hackers get to your router, they can access all the connected devices in your home. Here’s what you need to know.

If hackers get to your router, they can access all the connected devices in your home. Here’s what you need to know.

26 March 2019 min read

The enduring scourge of malvertising rears up anew

perex__ Threat actors are gaming the online advertising ecosystem to silently spread malware like never before; why it’s up to you to protect yourself.

Threat actors are gaming the online advertising ecosystem to silently spread malware like never before; why it’s up to you to protect yourself.

18 March 2019 min read

Q&A: Cybersecurity has become a primal battleground for AI one-upmanship

perex__ A discussion of how – and why – adversaries are using artificial intelligence to juice up malicious activities

A discussion of how – and why – adversaries are using artificial intelligence to juice up malicious activities

13 March 2019 min read

Like it or not, consumers are destined to play a big role in securing the Internet of Things

perex__ To instill security-by-design into emerging IoT systems, consumers must stay aware of new risks, demand appropriate levels of privacy and safety.

To instill security-by-design into emerging IoT systems, consumers must stay aware of new risks, demand appropriate levels of privacy and safety.

7 March 2019 min read

Ethical AI requires ethical humans

perex__ Can AI be evil? Garry Kasparov explains how AI works, and where ethics come into play.

Can AI be evil? Garry Kasparov explains how AI works, and where ethics come into play.

19 February 2019 min read