Sections

Viewpoints

The Eight Essentials of Secure Computing

Beginning with a secure browser and ending with a healthy paranoia, here are the essentials of staying safe online

24 June 2019 min read

Do you know the last time you were socially engineered?

perex__ The intensity of phishing campaigns endures, as threat actors manipulate human foibles to gain unauthorized access to homes and companies

The intensity of phishing campaigns endures, as threat actors manipulate human foibles to gain unauthorized access to homes and companies

19 June 2019 min read

What does gaming cost you?

perex__

The gaming industry uses psychological tactics to trigger addiction and more spending, but gamers can stay safe and sane with these tips.

30 May 2019 min read

Mobile threats are everywhere – here’s what you can do

perex__ Even if your company issues you a locked-down smartphone, embracing best security practices remains vital

Even if your company issues you a locked-down smartphone, embracing best security practices remains vital

14 May 2019 min read

The Supply Chain; aka the Hacker Food Chain

perex__ {value=Could you be the weak link for hackers? }

Could you be the weak link for hackers?

13 May 2019 min read

Geopolitical cybersecurity comes home

perex__ {value=There will be more and more investigations into technology originating in undemocratic states}

There will be more and more investigations into technology originating in undemocratic states

9 May 2019 min read

Visit Avast website

Why Android users must remain vigilant about malicious apps

perex__

Byron Acohido sits down with with Nikolaos Chrysaidos, head of Mobile Threat Intelligence & Security at Avast Threat Labs

6 May 2019 min read

The state of things in the internet of things

perex__ Security is not being designed into new smart devices because a rush to market takes precedence

Security is not being designed into new smart devices because a rush to market takes precedence

30 April 2019 min read

Social engineering – It’s not just about phishing

perex__ When deception is used to hack your mind

When deception is used to hack your mind

14 April 2019 min read

Please, everyone, let’s not call it ‘fake news’ anymore

perex__ Digital disinformation campaigns, leveraging behavior profiling and social media, are on the rise — and causing harm.

Digital disinformation campaigns, leveraging behavior profiling and social media, are on the rise — and causing harm.

2 April 2019 min read

Routers: a vulnerable opening to your home and personal data

perex__ If hackers get to your router, they can access all the connected devices in your home. Here’s what you need to know.

If hackers get to your router, they can access all the connected devices in your home. Here’s what you need to know.

26 March 2019 min read

The enduring scourge of malvertising rears up anew

perex__ Threat actors are gaming the online advertising ecosystem to silently spread malware like never before; why it’s up to you to protect yourself.

Threat actors are gaming the online advertising ecosystem to silently spread malware like never before; why it’s up to you to protect yourself.

18 March 2019 min read