Some kids take their first steps into the digital world at the tender age of one, when they discover Elmo apps on the family iPad. By the time we give them their first cell phones, they’re already familiar with the web, basic internet etiquette, and th…
An elaborate and sophisticated criminal operation like something out of an Oceans 11 sequel has just been uncovered, and the caper here is mass malvertising. While investigating exploit kits, security researchers stumbled upon an operation where crimin…
Sure, surfing the web in “incognito” or “private” mode might seem more secure than doing it with a totally unsecured browser—the phrases imply an air of security—but recent research and an overwhelming amount of anecdotal evidence from securi…
Sure, surfing the web in “incognito” or “private” mode might seem more secure than doing it with a totally unsecured browser—the phrases imply an air of security—but recent research and an overwhelming amount of anecdotal evidence from securi…
Independent testing lab AV-Comparatives just published its semiannual Business Security Test report, which aggregates a half-year’s worth of tests known as the lab’s Business Main-Test Series. Avast Business Antivirus Pro Plus — a cloud-console managed…
You know full well that cybercriminals want your money, and we know full well that you already know that. If we’ve done a good job within these blog posts, we’ve already conditioned you to always take a moment to assess your security before doing any o…
Mobile devices may seem like the pinnacle of digital sophistication, but in terms of security, they lag far behind laptops and desktops—meaning that the mobile trove of valuable consumer information, browsing histories and location tracking is more vul…
Source code to Exobot banking trojan leaked
“This has happened in the past, and it poses a risk as we saw in the case of the infamous Mirai botnet,” says Avast Security Evangelist Luis Corrons, speaking to the news that the source code to a potent ban…
The IoT world is abuzz with the discovery of a new Bluetooth flaw that opens the door to man-in-the-middle attacks, which are exactly what they sound like — attacks where a third party wedges itself between two of your networked devices and helps itsel…
Do you have conference plans before the summer ends? If so, there may be time to catch up with the Avast Business team. You can also receive free registration, on us, for ChannelCon and the ASCII IT SMB Summits (for the ASCII events, use promo co…