Not a day goes by without a new article appearing about the mass collection of personal data by companies and other organizations. The number of reports about hacked servers, which often involve the theft of many people’s personal information, is also on the rise. On top of that, there are the reports about data losses as a result of lost or stolen devices such as smartphones, tablets, and notebooks. Antimalware vendors are also identifying an ever increasing number of items of malware that are getting ever better at infecting computers to steal data.
Has technology affected your perception of crime? While the list of criminal acts that take place around the world is still as long as ever, cybercrime in particular seems to be getting more attention than ever before.
It’s no secret that the Internet brings a number of dangerous threats with it, but the rise of social media has added an even more complicated layer of problems to the situation. Whether they realize it or not, the truth is that many people let their guard down when communicating through social networks because they feel like they offer a personal experience. That can be true to a large extent, but it’s still a good idea to keep your guard up when using social media
The Internet is a child of the United States of America, so it does not come as a surprise that only Latin letters and some scientific characters were used when the systems and the software (then called ARPANET) were designed. In today’s world, where roughly half the global population, with its different letters and alphabets […]
Check out what some of the coolest Avira nerds have planned for next year. It will give you a good hint of our guilty little pleasures.
All kinds of fun facts bounce around the internet. You might have seen the one about contextual reading: It deson’t mttaer in waht oredr the ltteers in a wrod aepapr, you can sitll raed it wouthit pobelrm. See how this neuro-scientific peculiarity helps phishing criminals earn lots of money and what simple things you can do to protect yourself.
As the holiday times approach, many of us increase our online shopping. Unfortunately, along with the increase in online purchases comes an increase in phishing scams, credit card data breaches and even hacks to physical point-of-sale (POS) terminals.
Here are a few tips for geeks to save their holidays: simple explanations of 3 of the biggest infosec-related threats of the year 2014, to share with their friends & relatives.
If you were asked to name the country that you thought is the source of the majority of hacking attempts, which country would you name?
We have been wrong.
In 2012 when we started the iTES project (a project which deals with running vulnerable parts of a computer system in virtual machines; find out more in this blog post) our basic assumption was that until 2014 malware will no longer detect virtual machines because they would be too common …