written by Jakub Kroustek, Vladislav Iliushin, Anna Shirokova, Jan Neduchal and Martin Hron
Disclaimer: Analysis of the server content and samples was done on Thursday, September 20th. Follow the Avast Blog for further updates.&nbs…
If you are thinking of reshaping your business into an MSP (managed service provider) that offers managed security services to SMB clients, your timing could not be better. Small to medium-sized businesses are in dire need of cybersecurity, and they ar…
In the grand scheme of all things security, app permissions are generally treated as the least important. After all, who hasn’t felt that pang of impatience when shown one yes-or-no option after another, when all we want is to start using that cool new…
Most of us have experienced an overheated cell phone, particularly that radiating warmth after a conversation that went on extra-long. But what are some of the other causes why phones get so hot? Sometimes to the point where it won’t function until it …
All-in-one super malware hits the internet
A self-propagating malware mashup has been found lurking online. Called Xbash, the all-in-one malware is thought to be made by crime syndicate Iron Group and boasts of botnet, ransomware, diskwiper, cryptojac…
The Company
Located between Cleveland and Akron, Richfield-based DIS Computers has been providing IT and security services for small businesses and enterprises in northeast Ohio for more than 27 years. With 90% of its business dedicated to managed ser…
In the bustling industry of cybercrime, ransomware has always been a popular weapon of choice…until this year. In 2018, illicit cryptomining (AKA cryptojacking) took the title, surging 459%. Cryptojacking is the crime of using somebody else’s compute…
Previously in Part 1 of The Avast Guide to Android Apps, we covered all the common malware and how to deal with it. In part 2 of our ongoing series, we take a closer look at the murky world of Android viruses, how they can infect your smartphone, …
We are surrounded by technology. Our devices are always on and always connected, and therefore, so are we. We scroll through our smartphone notifications in the morning, listen to podcasts on our commute, spend an entire workday in front a computer scr…
New vulnerabilities found in NUUO surveillance software can put cybercriminals in the director’s chair. When exploited through a stack buffer overflow, the Peekaboo vulnerability grants hackers full control over the surveillance video. Assuming control…