Most read categories

NIS2

NIS2

9 posts
Cybersecurity

Cybersecurity

42 posts
AI & ML

AI & ML

4 posts
Educational

Educational

59 posts
General

Avira Techblog: Security 101: August 2012

As previously announced, we continue to answer questions received from the readers of the PC.COM magazine. Do I need to uninstall other internet security products before installing a new one?  And why? Yes, it is mandatory to uninstall any security product before installing another one. There are many reasons for this, but the most important are: • The real time scanners will […]

General

Avira Techblog: 0-day exploit for Java 1.7

Recently a vulnerability in Oracle’s Java Runtime Environment (JRE) 1.7 was discovered that may allow an applet to execute any program with arbitrary permissions. The JRE framework allows any browser on any supported platform to execute Java applications called applets in the browser. Tha JRE has its own security mechanisms, called Security Manager in Java. […]

General

Avira Techblog: Speed ticket from NY Police via email

No, it is actually a pretty interesting spam email which I received. The emails pretend to come from New York State ”Department of Motor Vehicles” and informs the recipient that he/she violated the speed limit . In order to see more details, a form hosted on a website should be accessed. The interesting part in this […]

quoted

Quoted in Washington Time: smartphone security

The article ran today from Shaun Waterman of The Washington Times re: smartphone security: http://times247.com/times-news/tech-firm-makes-smart-phones-safer     Fraud follows the money Researchers in Europe have identified malware that surreptitiously forces smartphones to make calls or send text messages to premium rate lines, racking up income for the crooks who own the numbers and huge bills […]

Uncategorized

Finally, officially CSSLP certified

(ISC)2 requires that a candidate meets some requirements before he/she receives the right to call himself/herself (ISC)2 certified.     Receiving the (ISC)² credential is a several-step process: Required Experience – possessing the required number of years for the appropriate credential Study – taking advantage of the educational materials (ISC)² makes available for you to review and […]

News quoted

Never forget that as soon as any information is published on a public website, it doesn’t actually belong to you anymore

Avira Survey Finds Computer Users Don’t Feel Safe on Social Media Sites “This survey was very interesting because it demonstrated that even though social media sites are very popular among the general population, computer users from all over the world have the same concerns,” said Sorin Mustaca, data security expert at Avira.“They are wary of […]