Author Archives: Avast Blog

Cybersecurity is a process, not a one-time solution

      No Comments on Cybersecurity is a process, not a one-time solution

Avast for Business security

Digitization – the use of social, mobile, analytics, and cloud technologies to generate, process, store and communicate data – is transforming everything, with profound implications on how we learn, work and play.

“Digital transformation is not just a technology trend, it is at the center of business strategies across all industry segments and markets,” stated IDC.

Oktoberfest 2016: How to quickly connect to secure Wi-Fi in Munich

Oktoberfest Wi-Fi

This Saturday, the 183rd Oktoberfest will take place on the Theresienwiese in Munich, Germany. People will travel to the Bavarian capital from all over the world to enjoy beer, music, chicken, cotton candy, amusement rides and more!

If you are traveling to Munich for Oktoberfest, you probably want to share your exciting beer hall photos and videos with friends and family to show off (as soon as possible) what an awesome time you are having! You may also need to access Google Maps to find your way around the city while sightseeing. Now, you’re probably asking yourself: How am I going to do this, unless I pay for an expensive international plan?

Avast celebrates National Programmer’s Day

      No Comments on Avast celebrates National Programmer’s Day

programmers-day_2016.jpg

Today is National Programmers Day! The Avast team values each and every one of our programmers, and we know that we wouldn’t be where we are today without them by our side. The hard work and accomplishments of our programmers, developers and UI team has helped Avast become the world’s most trusted mobile and PC security in the world, and that’s a lot to be proud of!

Zepto ransomware now introduces new features to better encrypt your files

Zepto ransomware is a relatively new player in the ransomware scene, and it’s closely related to the infamous Locky ransomware. Taking a closer look at Zepto’s code, we found that the code is pretty much the same as Locky’s code, but it has been slightly modified. The malware authors behind Zepto use the same methods used to spread Locky, and even the infection vector and the TOR payment page are the same, which makes us think that the people behind Locky are now spreading Zepto. The only difference between Locky and Zepto is the ransom demand. Zepto’s demand is much higher than Locky’s, 3 Bicoins (approximately $1,850).

2012 Dropbox breach strikes again, dumps 68 million passwords online

Dropbox has suffered a password dump of epic proportions. (Image via Graham Cluley)
Dropbox has been going through some rough times as of late. In the past 24 hours, headlines have been popping up left and right about a Dropbox password dump of epic…