Avast Blog – 10.29.19 (10.28.19)
I would like to take a step back to take in a broader, bigger picture than usual in this article, moving across time as well as into the legal sphere. Technology isn’t just hardware and software; it’s a fundamental component of every aspect of our lives and our society.
Source: You May Not Own Your Data
Avast Blog – 10.18.19 (10.15.19)
A pair of malicious activities have become a stunning example of digital transformation – unfortunately on the darknet.
Credential stuffing and account takeovers – which take full advantage of Big Data, high-velocity software, and automation – inundated the internet in massive surges in 2018 and the first half of 2019, according to multiple reports.
Source: The Rise Of Credential Stuffing And Account Takeovers | Avast
Avast Blog – 8.13.19 (8.12.19)
The European Union’s General Data Protection Regulation (GDPR) has become the world’s gold standard for user privacy and breach disclosure regulation. It affects any business around the world that processes or stores the personal data of individuals resident in any EU country. It specifies standards for protecting that data, punitive penalties for mishandling it, stringent rules for the disclosure of its loss, and assures EU citizens certain rights and protections for their personal data.
Read more: Does The U.S. Need Its Own Privacy Law?
Avast Blog – 8.9.19 (8.8.19)
Creating malware that is capable of making money takes little to no ability to write original computer code, recent research by Avast has shown. All that’s needed is the ability to bundle existing tools together using publicly available snippets of code.
Read more: A Case Study In The Ease Of Cybercrime
Avast Blog – 8.7.19 (8.6.19)
“All we know is MONEY! Hurry up! Tik Tak, Tik Tak, Tik Tak!”
This is an excerpt from a chilling ransom note Baltimore IT officials received from hackers who managed to lock up most of the city’s servers in May. The attackers demanded $76,000, paid in Bitcoin, for a decryption key. Baltimore refused to pay – choosing, instead, to absorb an estimated $18 million in recovery costs.
Read more: How Did Ransomware Become A Lasting Threat?