Sections

Viewpoints

Why Android users must remain vigilant about malicious apps

Byron Acohido sits down with with Nikolaos Chrysaidos, head of Mobile Threat Intelligence & Security at Avast Threat Labs

6 May 2019 min read

The state of things in the internet of things

perex__ Security is not being designed into new smart devices because a rush to market takes precedence

Security is not being designed into new smart devices because a rush to market takes precedence

30 April 2019 min read

Social engineering – It’s not just about phishing

perex__ When deception is used to hack your mind

When deception is used to hack your mind

14 April 2019 min read

Please, everyone, let’s not call it ‘fake news’ anymore

perex__ Digital disinformation campaigns, leveraging behavior profiling and social media, are on the rise — and causing harm.

Digital disinformation campaigns, leveraging behavior profiling and social media, are on the rise — and causing harm.

2 April 2019 min read

Routers: a vulnerable opening to your home and personal data

perex__ {value=If hackers get to your router, they can access all the connected devices in your home. Here’s what you need to know.}

If hackers get to your router, they can access all the connected devices in your home. Here’s what you need to know.

26 March 2019 min read

The enduring scourge of malvertising rears up anew

perex__ {value= Threat actors are gaming the online advertising ecosystem to silently spread malware like never before; why it’s up to you to protect yourself. }

Threat actors are gaming the online advertising ecosystem to silently spread malware like never before; why it’s up to you to protect yourself.

18 March 2019 min read

Visit Avast website

Q&A: Cybersecurity has become a primal battleground for AI one-upmanship

perex__ A discussion of how – and why – adversaries are using artificial intelligence to juice up malicious activities

A discussion of how – and why – adversaries are using artificial intelligence to juice up malicious activities

13 March 2019 min read

Like it or not, consumers are destined to play a big role in securing the Internet of Things

perex__ To instill security-by-design into emerging IoT systems, consumers must stay aware of new risks, demand appropriate levels of privacy and safety.

To instill security-by-design into emerging IoT systems, consumers must stay aware of new risks, demand appropriate levels of privacy and safety.

7 March 2019 min read

Ethical AI requires ethical humans

perex__ Can AI be evil? Garry Kasparov explains how AI works, and where ethics come into play.

Can AI be evil? Garry Kasparov explains how AI works, and where ethics come into play.

19 February 2019 min read

Face the privacy issue of facial recognition

perex__ When does pervasive public surveillance start to infringe on our basic rights?

When does pervasive public surveillance start to infringe on our basic rights?

12 February 2019 min read

Let’s bring privacy back

perex__ It’s time to encourage businesses to adopt the New Privacy Code of Conduct to protect users

It’s time to encourage businesses to adopt the New Privacy Code of Conduct to protect users

28 January 2019 min read

Gamers and gaming security

perex__ Rack up all of guest blogger Kevin Townsend’s good points as he explains how online gamers have to outsmart hackers...in addition to their opponents.

Rack up all of guest blogger Kevin Townsend’s good points as he explains how online gamers have to outsmart hackers...in addition to their opponents.

24 January 2019 min read