At Avast, it’s our business to stay on top of security risks that affect computer users around the world. As cryptocurrencies grow in popularity — as well as the inevitable cryptomining that follows — this is an area we are committed to closely monitoring. Here are two stories from the week that caught our attention.
In 2018, our Avast Business team will be crossing state and international borders, hitting top IT and MSP industry events to meet with partners and showcase our latest and greatest. If one of these events happens to be in your area, please take advanta…
What is a VPN connection and why are so many people talking about it? The term crops up in every conversation about the internet lately, and for good reason. While VPNs were once novel tech solutions, they are now necessary tools. At the basic level, V…
It won’t be exactly groundbreaking news when we tell you that your apps consume your Android’s battery, data, and storage. But here’s what far fewer people know: most apps run invisible in the background and the worst offenders drain all three (battery, data, and storage) at the same time. To help you navigate the digital sea of apps and learn which ones are sapping your resources, Avast, the global leader in digital security products, regularly releases the Avast Android App Performance & Trend Report.
For most of us, the use of internet-based services is a huge part of our everyday lives. We bank. We shop. We stream. What’s the one thing all of these services have in common? Passwords. They all demand passwords.
You’ve probably heard by now that, in December of 2017, the FCC voted to repeal the net neutrality laws put in place in 2015. What does that mean to you? Net neutrality classified the internet as a utility that could be regulated, and the primary regulation prevented Internet Service Providers (ISPs) in the US from giving preference to certain websites and services while hindering or blocking others. Basically, it required ISPs to treat all internet data equally.
If you are having a hard time thinking beyond a dozen roses and a box of chocolates for February 14th, we’re here to help. Sure, those classic gifts can still bring a smile and a swoon, but chocolates disappear within a few hours (reappearing on our waistlines), and roses don’t last long enough to justify how expensive they are this time of year. (By the way, if roses are your thing, you’ll appreciate this fascinating experiment conducted by Brad’s Deals to determine the best time of the year to find the best prices on roses. Spoiler alert: it’s not Valentine’s Day.)
Today’s children are known as “digital natives.” That is, they were born into a world where “phone” is short for “smartphone,” not “telephone,” and staring at screens is more necessity than luxury. But at what saturation point does phone usage get unhealthy? How much is too much?
It’s the review we always welcome: AV-Comparatives conducts independent tests throughout the year to take a hard look at 21 security products for Windows, putting them through rigorous testing that examines their ability to 1) protect against real-world internet threat, 2) identify thousands of recent malicious programs, 3) provide protection without slowing down the PC, and finally, 4) remove malware that has already infected a PC.