When it comes to steering clear of security-related scandals, iPhone has an excellent reputation. And sure, as a rule—provided you don’t jailbreak your phone—it is generally safe from malware. But that doesn’t mean the iPhone forever remains immune. Even recently, there have been numerous reports of Apple users who have had their iCloud accounts hacked by cybercriminals who then demanded money in exchange for the passcode to unlock the device. While this recent breach wasn’t any fault of Apple’s, it still affected Apple users, so that’s reason enough keep reading.
October is Cybersecurity Month, so there is no better time to introduce Avast Ultimate, a premium bundle of our greatest security, performance, and privacy solutions.
Virtual private networks (VPNs) exist to protect the user’s privacy online. They are supposed to provide a private, encrypted browsing experience, making you essentially invisible to any online trackers. VPNs do this by allowing the user to send their data to the internet via an encrypted tunnel to the VPN server where the data is then sent on behalf of the server’s IP address—hiding the user’s IP address, so nobody knows where they really are.
It’s time once again for backpacks, busses, and school bells. Here are a few good lessons to share with your kids so they can get through the school year with an A+ in online safety.
These days, keeping your devices secure, data private, and online world safe from harm seems like a daunting task. While plenty of reliable solutions exist for desktop and mobile, knowing where you’re vulnerable can be difficult … especially if you’re not familiar with the jargon thrown around regarding the latest data breach.
Our Q1 2017 report looks at the top performance-draining apps and the latest app and smartphone trends.
Gentlemen and Gentlewomen, start your search engines.
“Dear user, firstname.lastname@example.org just sent you an email inviting you to edit the following document that she shared with you.”
It’s a nightmare situation, no doubt about it: a virus has taken over your computer and locked up your most valuable files. A ransom note filling your screen says you have a certain amount of time to pay the hacker, or the amount doubles. After it doubles, you again have a certain amount of time to pay before the criminal behind the ransomware attack destroys your files forever.
Earlier this week, a Petya-based ransomware virus targeted the Ukraine in the largest cyberattack the nation has ever experienced, taking down the central bank, postal services, and commercial enterprises such as the Antonov aircraft manufacturer. Whil…