Weakest Link In Security | Avast

| | #viewpoints
Put simply, most people believe that the weakest link in the security supply chain is the user. This attitude has become so widely accepted that it's almost set in stone. It is ...

IoT Attacks Intensified By Covid-19 | Avast

| | #viewpoints, covid-19 scams
The Internet of Things (IoT) has come a long, long way since precocious students at Carnegie Melon University installed micro-switches inside of a Coca-Cola vending machine so they could remotely check on ...

Qanon’s Path From Fringe To Mainstream | Avast

| | #viewpoints
If you’ve paid even a tiny bit of attention to the U.S. presidential election this year, then you’ve heard the name QAnon — or “Q” to his followers. In the past four ...

Post-Modern Computational Propaganda | Avast

| | #viewpoints
It is well known that Great Britain and the United States were the first countries to use mass media technologies for propaganda purposes, literally teaching Germany and the Soviet Union how to ...

Canceling the Cancel Culture | Avast

| | #viewpoints
In a recent episode of my “Garry on Lockdown” video series, I discussed the rise of “cancel culture” with the author and critic Thomas Chatterton Williams ...

Social Media Vs Democracy | Avast

| | #viewpoints
The phenomenon that we now call ‘social media’ arguably started around the turn of the millennium with sites like Friends Reunited, at first offering a simple way for the internet to allow ...

The Social Dilemma Review | Avast

| | #viewpoints
Earlier this month, Netflix started streaming the docufilm The Social Dilemma. It was first screened at Sundance earlier this year, and now is widely available. Since its release, it has been widely ...

Credential Stuffing | Avast

| | #viewpoints
What do wildfires and credential stuffing have in common? For several years now, both have flared up and caused harm at the fringes of population centers and our digital economy. And, now, ...

Life After Privacy | Avast

| | #viewpoints
Any serious discussion on modern privacy and surveillance is subject to the unnamed but universal law that George Orwell’s novel 1984 must be referenced in some way at some point. In his ...

Big Lessons From The Twitter Bitcoin Hack | Avast

| | #viewpoints
Graham Ivan Clark, Onel de Guzman and Michael Calce. These three names will go down in the history of internet commerce, right alongside Jack Dorsey, Mark Zuckerberg and Jeff Bezos ...