The same advice parents might deliver to young drivers on their first solo journey applies to everyone who wants to navigate safely online. A special agent in our Cyber Division offered the following: – “Don’t drive in bad neighborhoods.” – “If you don’t lock your car, it’s vulnerable; if you… Read more »
Security? Yes! All this fuss about WordPress website security. Having a WordPress site is great, blogging at it makes you feel like you own an Empire. But somehow, it never remains safe when intruders get in. When they try to dethrone you. No matter what happens, you got to do what… Read more »
In an information-based economy where bring-your-own devices (BYOD) and, increasingly, bring-your-own applications (BYOA), are the norm, IT groups are struggling to enable their organizations to be fast and flexible while protecting their digital asset…
Ghost Push is a malware family that exploits vulnerabilities to gain root access to Android devices to then download and review other apps in the background. Using social engineering, users are tricked into downloading Ghost Push from third party app stores or via links sent in text messages. Once installed, Ghost Push tries to gain root access. As the name suggests, Ghost Push acts in a ghostly fashion once it has root access, meaning infected users don’t notice anything – everything happens in the background. Recently, a new variant of the Ghost Push malware, Gooligan, was detected spreading in the wild. The Gooligan variant steals email addresses and authentication tokens stored on the infected devices, gaining access to users’ Google account data, including Gmail and Google Play. More than one million users’ Google Play accounts were affected.
Originally published at The Parallax.
With the digital threatscape proliferating exponentially – i.e. phishing emails increased almost 800 percent quarter-to-quarter in Q1 2016, to 6.3 million, while ransomware soared 300 percent year-over-year on its way to a billion-dollar-a-year problem – it’s important to remember that effective cybersecurity rests on three pillars – products and services, processes, and people. Simply throwing more money and resources at cybersecurity is not the answer: People are the key, and everybody has a role to play in effective cybersecurity.
Cerber ransomware is a highly effective ransomware family that has been developed by professional cybercriminals. Fortunately for us, even professional cybercriminals make mistakes – like misconfiguring their servers. Twitter user and researcher @Racco…
Facebook, the social giant that many people check obsessively, is testing a new, handy feature to help their users find free public Wi-Fi directly via their Facebook mobile app. The tested feature is available only for selected iOS users in various countries.
“To help people stay connected to the friends and experiences they care about, we are rolling out a new feature that surfaces open Wi-Fi networks associated with nearby places,” a Facebook spokesperson told Mashable.
We believe that being connected gives us flexibility and great opportunities, but before you actually connect to any public Wi-Fi recommended by Facebook, double check its security and speed. You can do it for free, using Avast Wi-Fi Finder.
How does Facebook’s Find Wi-Fi work?
Once you click on the Find Wi-Fi feature, you will see an actual map with a Wi-Fi spots, showing you the distance and directions towards the public free Wi-Fi hotspots available in your area.
Image source: Venturebeat
What about privacy and security?
At this point there is little information available about the Find Wi-Fi feature. There are many speculations on why Facebook is even releasing it. One of the strongests is related to the company’s mission to help people access the internet (even if it’s through its platform). Other theories involves collecting information about business and its users.
And then there’s the whole targeted advertising thing — getting you to free hotspots around the city could impact the ads that you’re shown within your Facebook experience, selling you on hanging out at more popular local merchants and restaurants, comments Ken Yeung
We don’t want to speculate, we just follow the available facts. One of our tasks as a security company is to raise questions about safety and privacy of users’ data. Facebook will use this feature to collect data about users for advertising purposes.
It will not only show you the business offering free Wi-Fi, but also how long it’ll take to get there and the network you can connect to. Facebook recommends that you give the app permission to access your location history, claiming it will “allow Facebook to build a history of precise locations received through your device.”
What about safety?
We know that open Wi-Fi hotspots are great: they allow you to access the Internet when you travel to new places. But losing your personal data is not worth it.
“Many of us have found ourselves in situations when traveling or working remotely in which we’re unable to find reliable and secure Wi-Fi. With the Avast Wi-Fi Finder, consumers are now able to find a safe and fast Wi-Fi connection whether you’re at the gym, hotel, airport, bus station, library or café.” said Gagan Singh, president of mobile at Avast.
What is the added value of the Avast Wi-FI for the users? Our technology checks for the vulnerabilities of the Wi-Fi Hotspot such as:
- If the Wi-Fi hotspot is infected or exposed to a DNS attack
- Other devices connected to the network, to verify its security
- If the router of the hotspot is protected by a strong password and not accessible from the Internet, so upon accessing the hotspot, your device won’t be vulnerable to hackers
- If the hotspot itself it protected by a secure password
Last but not least: for the maximum protection of your data, we recommend you use VPN protection.
In February 2016, we ran an experiment at the Barcelona Airport and gathered more than 8 million data packets, proving that open Wi-Fi hotspots are risky. We learned the following information:
- 50.1 percent had an Apple device, 43.4 percent had an Android device, 6.5 percent had an Windows Phone device
- 61.7 percent searched information on Google or checked their emails on Gmail
- 14.9 percent visited Yahoo
- 2 percent visited Spotify
- 52.3 percent have the Facebook app installed, 2.4 percent have the Twitter app installed
- Avast could see the identity of 63.5 percent of the devices and users
“Many individuals recognize that surfing over open Wi-Fi isn’t secure. However, some of these same people aren’t aware that their device might automatically connect to a Wi-Fi network unless they adjust their settings,” said Gagan Singh, president of mobile at Avast.
To make sure that your connection is secure regardless of the Wi-Fi hotspot settings and avoid looking extensively for recommended, secure hotspot, we recommend that you use Avast SecureLine VPN.
Wir vergessen oft, dass Technologie ein zweischneidiges Schwert ist. Mit den Vorteilen eines jeden Fortschritts besteht die Möglichkeit, dass dieser für destruktive Zwecke verwendet wird. ISIS baut seine eigenen Drohnen, Botnetze kapern Geräte um große Teile des Internets lahm zu legen, und allgegenwärtiges Web-Publishing hat dazu geführt, dass gefälschte Meldungen echte Nachrichten auf den Social-Media-Kanälen übertreffen.
We are excited to announce the winners of Avast’s #LoveYourInternet giveaway. Eilish K. from London, England and Ryan B. from Maryland, USA, won a new Google Pixel phone for sharing why they love the Internet.
The use of ransomware against businesses is soaring, with incident response teams having to deal with up to 4 attacks weekly. Originally ransomware was aimed primarily at individuals, but it is now being targeted at businesses too, with annual cos…
Locky ransomware, a variant of ransomware that scrambles your files, changes all the names, and then demands payment to unscramble them and release them back to you, has taken a holiday of sorts. Avast detection of Locky shows that attacks have slowed …