Sections

Viewpoints

A primer on cyber espionage across the planet

State-backed cyber spying is pervasive – and its impact on geo-political affairs is deepening

25 July 2019 min read

Can AI be evil?

perex__ A conversation with Noel Sharkey of the Foundation for Responsible Robotics

A conversation with Noel Sharkey of the Foundation for Responsible Robotics

13 July 2019 min read

Can legislation make smart devices secure?

perex__ The temptation is to say yes, but the reality may be different

The temptation is to say yes, but the reality may be different

10 July 2019 min read

The Eight Essentials of Secure Computing

perex__ Beginning with a secure browser and ending with a healthy paranoia, here are the essentials of staying safe online

Beginning with a secure browser and ending with a healthy paranoia, here are the essentials of staying safe online

24 June 2019 min read

Do you know the last time you were socially engineered?

perex__ {value=The intensity of phishing campaigns endures, as threat actors manipulate human foibles to gain unauthorized access to homes and companies}

The intensity of phishing campaigns endures, as threat actors manipulate human foibles to gain unauthorized access to homes and companies

19 June 2019 min read

What does gaming cost you?

perex__ {}

The gaming industry uses psychological tactics to trigger addiction and more spending, but gamers can stay safe and sane with these tips.

30 May 2019 min read

Visit Avast website

Mobile threats are everywhere – here’s what you can do

perex__ Even if your company issues you a locked-down smartphone, embracing best security practices remains vital

Even if your company issues you a locked-down smartphone, embracing best security practices remains vital

14 May 2019 min read

The Supply Chain; aka the Hacker Food Chain

perex__ Could you be the weak link for hackers?

Could you be the weak link for hackers?

13 May 2019 min read

Geopolitical cybersecurity comes home

perex__ There will be more and more investigations into technology originating in undemocratic states

There will be more and more investigations into technology originating in undemocratic states

9 May 2019 min read

Why Android users must remain vigilant about malicious apps

perex__

Byron Acohido sits down with with Nikolaos Chrysaidos, head of Mobile Threat Intelligence & Security at Avast Threat Labs

6 May 2019 min read

The state of things in the internet of things

perex__ Security is not being designed into new smart devices because a rush to market takes precedence

Security is not being designed into new smart devices because a rush to market takes precedence

30 April 2019 min read

Social engineering – It’s not just about phishing

perex__ When deception is used to hack your mind

When deception is used to hack your mind

14 April 2019 min read