Sections

Viewpoints

The Authentication Puzzle

Producing a secure authentication process that keeps users happy is easier said than done, but it's necessary in order to keep them safe online.

3 July 2020 min read

The anatomy of a phish

perex__ Understanding different types of phishing attacks and the different triggers cybercriminals use to trick users into falling for it.

Understanding different types of phishing attacks and the different triggers cybercriminals use to trick users into falling for it.

26 June 2020 min read

What needs to be done to protect K-12 remote classes

perex__ Parents and school officials must collaborate to operate schools like a digital native start-up instilled with a security culture

Parents and school officials must collaborate to operate schools like a digital native start-up instilled with a security culture

19 June 2020 min read

How smartphones have become one of the largest attack surfaces

perex__ Our smartphone has become an extension of our person, making it a clear attack vector for scammers and hackers

Our smartphone has become an extension of our person, making it a clear attack vector for scammers and hackers

11 June 2020 min read

The growing threat of stalkerware

perex__ {value=Stalkerware is a growing domestic malware, with dangerous and sinister implications}

Stalkerware is a growing domestic malware, with dangerous and sinister implications

5 June 2020 min read

Should you trust the Apple/Google contact-tracing app?

perex__ {value=The tech giants are partnering on a tool for public good, but critics worry it will ultimately get used for predatory surveillance}

The tech giants are partnering on a tool for public good, but critics worry it will ultimately get used for predatory surveillance

29 May 2020 min read

Visit Avast website

What you need to know about email threats

perex__ As email threats are increasing in popularity, what can you do to protect your business or personal account from attack?

As email threats are increasing in popularity, what can you do to protect your business or personal account from attack?

8 May 2020 min read

Why COVID-19 will trigger faster, wider adoption of cyber hygiene principles

perex__ We have the security tools, frameworks and even regulations to implement robust data security – for companies and consumers

We have the security tools, frameworks and even regulations to implement robust data security – for companies and consumers

1 May 2020 min read

Why cyber hygiene is crucial to resolving COVID-19

perex__ As coronavirus-themed cyber attacks ramp up, consumers and companies must practice digital distancing to keep themselves protected.

As coronavirus-themed cyber attacks ramp up, consumers and companies must practice digital distancing to keep themselves protected.

24 April 2020 min read

The other coronavirus epidemic: cybercrime

perex__ Cybercriminals prey on fear during the COVID-19 for their own gain.

Cybercriminals prey on fear during the COVID-19 for their own gain.

17 April 2020 min read

Authoritarianism goes viral

perex__ In the midst of a global pandemic, all governments are tasked with caring for their citizens. How does this change for those under authoritarian regimes?

In the midst of a global pandemic, all governments are tasked with caring for their citizens. How does this change for those under authoritarian regimes?

7 April 2020 min read

The disclosure of vulnerabilities and the vulnerability of disclosures

perex__ Vulnerability disclosure is an important process to keep our systems safe. What if the disclosure itself is also vulnerable?

Vulnerability disclosure is an important process to keep our systems safe. What if the disclosure itself is also vulnerable?

25 March 2020 min read