Articles

  • Jul 11, 2024 | blog.avast.com | LUIS CORRONS

    Phishing is undoubtedly one of the most popular ways for cybercriminals to start a malicious attack, whether they're looking to steal someone’s identity or distribute malware. Since the emergence of phishing, this attack vector has only been growing — and it doesn’t look like it's going away any time soon. The Anti-Phishing Working Group (of which Avast is a member) is a non-profit organization that has been helping in the fight against phishing since 2003.

  • Apr 29, 2024 | blog.avast.com | LUIS CORRONS

    You notice a system prompt on your iPhone about your password. You click “Don’t allow.” Then it happens again and again, one after the other. At some point, you might get annoyed or start to panic and click “Allow.” Then, you get a phone call with an “Apple rep” to help you reset your password, but when they confirm your information, you notice that they got your name wrong. That’s exactly what happened to one man who was lucky enough to notice the charade before it was too late.

  • Apr 19, 2024 | blog.avast.com | LUIS CORRONS

    Our Threat Labs recently exposed a highly sophisticated malware operation known as “GuptiMiner”, which targets corporate networks specifically. Our team of experts got into research mode right away! They found out that GuptiMiner exploited a vulnerability in the eScan antivirus update process, quietly infiltrating corporate networks to unleash its malicious payloads.

  • Feb 13, 2024 | lavozdegalicia.es | LUIS CORRONS

    En un mundo donde internet ofrece infinitas posibilidades, desde la comunicación instantánea hasta el acceso a una cantidad inagotable de conocimiento, es esencial reconocer que junto con sus beneficios vienen sus peligros.

  • Jan 5, 2024 | tiinside.com.br | LUIS CORRONS

    O TikTok emergiu como um terreno fértil para a prática de fraudes financeiras, especificamente aquelas envolvendo criptomoedas. O amplo alcance da plataforma, juntamente com o seu apelo ao público mais jovem, apresenta uma perspectiva atraente para os cibercriminosos que pretendem explorar os usuários desavisados. Os golpes operam sob uma fachada de legitimidade, muitas vezes iniciada com um vídeo deepfake de uma figura respeitável endossando exchanges de criptomoedas.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →