In January, independent IT-security institute AV-TEST conducted a study of twenty mobile security products for Android. The goal was to test the three main pillars of a strong mobile security solution — malware detection, false positive prevention, and performance impact. Avast Mobile Security was evaluated in the study and aced all categories.
A lot of people (including us!) will tell you that you need to get a VPN (Virtual Private Network) to ensure your privacy and security when surfing the web. A VPN like Avast SecureLine creates an encrypted connection between you and a VPN server, which…
Zuckerberg apologizes for Cambridge Analytica ‘breach’
Facebook founder Mark Zuckerberg finally broke cover after nearly a week of silence as the fallout from the row over how a data company, Cambridge Analytica, was able to access the profiles of some 50m people who hadn’t consented to share their data with the company.
You’ve probably heard countless terms relating to cybersecurity, but here we are going to focus on just one: attack surface. An “attack surface” is simply the number of possible ways an attacker can get into a device or network and extract data. It’s an especially important measurement for SMBs because most think they are too small to be a target, but a quick look at their attack surface shows that it is in fact quite large, increasing their exposure to risk.
Everyone’s favorite social media site is currently the subject of hot debate, and we’re here to keep you grounded amidst the madness. First, let’s talk about what happened. Back in 2014, a quiz made the rounds on Facebook. 270,000 users took the quiz, which harvested data not just about them, but also their friends. As a result, the quiz aggregated the private info of 50 million Facebook users. All that data was then allegedly sold to the Trump presidential campaign.
The example on everyone’s minds is, of course, Russian interference in the 2016 presidential election, now further confirmed by special counsel Robert Mueller’s investigation. The Kremlin’s use of social media to stoke existing partisan tensions in the U.S., achieved through a sophisticated multi-million-dollar operation, resulted in the indictment in February of thirteen Russian nationals and three companies.
Unfortunately, Macs might be the sports cars of the IT business, but just like any car, they need proper maintenance to keep running. In this guide we’ll walk you through the essentials — and even some great secrets — to clean up invisible clutter and tune up your MacBook, iMac, or Mac Pro beyond its limits.
Weekly security roundup week of March 12th
Samba admins urged to patch
An important vulnerability that came to light this past week is one in the venerable Samba open-source networking stack – and if you’re a Samba admin, you need to update now.
Endpoints are an easy target for hackers, so it’s essential that small businesses protect themselves. Connected employees, vulnerable software and weak antivirus all contribute to this being a favorite target of hackers. And, as the list below details, there are many types of cyberattacks that target endpoints, from phishing to malvertising.
Our new Avast Business endpoint security products are once again in the spotlight, highlighted in CRN’s 2018 Security 100 list of the 20 Coolest Endpoint Security Vendors.