ICE skates around privacy
The American Civil Liberties Union (ACLU) issued grave concerns this week over the recent revelation that the US Immigrations and Customs Enforcement (ICE) holds a $6.1M contract with Vigilant Solutions, an automatic licence…
In February 2019, Avast’s mobile threat intelligence platform (MTIP), apklab.io, discovered a number of “selfie beauty apps” on the Google Play Store posing as legitimate apps, but in reality were filled with adware and spyware. The three apps we found…
The Company
With a portfolio that includes 22 premier hotel franchise and hospitality brands, The Kishan Group is one of North America’s top-performing lodging companies. According to Mike Marcum, Director of IT for The Kishan Group, “My tea…
When antivirus (AV) software first arrived in the late 1980s, the science of combating computer viruses was very straightforward.
A new cyber-scam collecting social media account logins is making its way through iOS devices, fooling users with its realistic-looking login process, which is really a video simulation. Unsuspecting victims are entering their Facebook credentials into…
Statisticians estimate the number of cell phones in the world to be about 5 billion, with smartphones constituting about half of them. That’s 2.5 billion smartphones in use, which means a good third of the world’s population is texting, FaceTiming, sen…
It’s International Women’s Day. In observation, we’re taking a look at the male-dominated tech industry through the eyes of one of its female professionals, one of our top researchers, Galina Alperovich. Galina is a Machine Learning Researcher at Avast…
Cryptojacking stole the limelight away from ransomware at the end of 2017, becoming a major cyberthreat that continued into 2018. On March 8, 2019 Coinhive, the service that enables websites around the world to use browser CPUs to mine Monero, will shu…
New platforms to clobber cybercrime
Two major announcements at this week’s RSA mark strident leaps forward in cybersecurity, and both rely on the same core principal — sharing knowledge. The combined efforts that make these cybersecurity tools so pote…
There are certain things we as consumers have come to do intuitively: brushing our teeth in the morning; looking both ways before crossing a city street; buckling up when we get into a car.