
Last week, security blogger Brian Krebs’ blog, KrebsOnSecurity.com, was taken offline with a massive distributed denial-of-service (DDoS) attack. The sustained attack threw upwards of 620 gigabits per second of junk data at his site – more than enough to take down a site of that size.
Avast CEO Vince Steckler with Avast Threat Labs analysts
In July, we announced our plan to acquire AVG Technologies. Today, I am proud to announce the completion of the acquisition of a majority stake in AVG. So we will operate as a single company as …
Secret Conversations available on mobile devices Source FB newsroom
Taking a trip down memory lane with Avast version 4.8.
Beginning in January 2017, virus definition updates will be discontinued for Avast version 4.8.

Keep calm and pick up the phone with Avast Call Blocker.
For many iOS users, spam calls have slowly but steadily become a regular and bothersome part of life. Although users can label specified numbers as spam on their device, this is time-consuming and quickly gets old. Many call blocking apps require access to users’ contact lists, which isn’t ideal, as private contacts shouldn’t need to be seen by companies in order to provide protection.
My colleagues from the Avast Threat Labs published an interesting (and detailed) blog post about Petya ransomware and its little brother, Mischa. This duo works together to encrypt disks and files, pushing innocent victims to pay thousands of dollars t…
This season finale had me sitting in front of the TV saying “what?” a couple of times – a sign that this was another great episode!

Digitization – the use of social, mobile, analytics, and cloud technologies to generate, process, store and communicate data – is transforming everything, with profound implications on how we learn, work and play.
“Digital transformation is not just a technology trend, it is at the center of business strategies across all industry segments and markets,” stated IDC.
Petya and Mischa ransomware, come as a package deal, distributed by its creators, Janus. They are very unusual in that they combine two different methods to encrypt user data. Unlike most other ransomware, Petya primarily encrypts MFT (Master File Tabl…