Author Archives: Avast Blog

Got an aging parent? Tell them about the Grandparent scam

Scammers rob elderly victims of an estimated $3 Billion per year. A scam that has been around since at least 2008 is still active and targeting elderly folks. Seventy-four year old Avast evangelist, Bob Gostischa, who knows a thing or two about scams, security, and privacy, received a call just yesterday from a scam artist […]

Avast team at Webexpo conference

      No Comments on Avast team at Webexpo conference

This past weekend, Prague hosted hundreds of web professionals at the Webexpo conference. Avast Software was a proud general sponsor of this event. Attendees could meet our team at the Avast booth, try Avast technologies, and chat with our colleagues. They could also learn first hand how it is to work for the Best Czech Employer of […]

Avast for Business solutions provide businesses with new opportunities

Last week, we sat down with Alan Scott of the Mid-Valley Literacy Center at Avast’s headquarters. During his time visiting Prague, Alan enjoyed exploring the city and visiting some of its museums in order to escape the (somewhat unexpected) September heat. Located in Keizer, Oregon (USA), the Mid-Valley Literacy Center’s mission is to empower adults […]

Apple removes malicious apps from App Store

      No Comments on Apple removes malicious apps from App Store

While the rest of us were soaking up the last of the season’s sunshine, Apple researchers spent the weekend removing hundreds of malicious apps for iPhone and iPad from the iOS App Store. “The recent exploit on Apple has shown us that even Apple’s system can be compromised quite easily,” said Avast security researcher Filip […]

AirDrop vulnerability is an easy avenue for hackers to exploit Apple devices

Recently, an alarming vulnerability has cropped up on iOS devices. This security loophole allows an attacker to overwrite arbitrary files on a targeted device and, when used in combination with other procedures, install a signed app that devices will trust without presenting a warning notification to users. In a recent article published on Threatpost, it’s […]

Avast Mobile Security: So much more than just another security app

With millions of applications waiting to be installed in our gadgets, you not only need to be concerned about quality, but you also need to take the proper measures in order to avoid your phone becoming infected by malware. Unfortunately, we already know that Google Play and the Windows Store aren’t immune to malware. Even the Apple Store […]

Ads: Love or hate?

      No Comments on Ads: Love or hate?

Ad-injection is an increasingly annoying and dangerous problem There are basically two reactions people have when they see ads in their browser. Some think they add interesting content and possibilities, insights and ideas or even, opportunities. The other group considers them as a distraction, an invasion and a disruption to what they were doing. But most everyone will agree, […]

Are Freemium apps worth the price?

      No Comments on Are Freemium apps worth the price?

Freemium is a mashup of the words ‘free’ and ‘premium’. It is well-know that both Apple and Google revenues from their app stores come mostly from freemium apps.  It can be an application like Avast Mobile Security, a game, or any service provided free of charge. The developers make money when a customer pays for upgrades or additional […]

Are Freemium apps worth the price?

      No Comments on Are Freemium apps worth the price?

Freemium is a mashup of the words ‘free’ and ‘premium’. It is well-know that both Apple and Google revenues from their app stores come mostly from freemium apps.  It can be an application like Avast Mobile Security, a game, or any service provided free of charge. The developers make money when a customer pays for upgrades or additional […]

DeepScreen technology protects your business data before it’s at risk

Eliminate the risk of your sensitive business data being hacked. Most of the truly dangerous malware is designed to harvest valuable business information – especially financial data. So hackers design malware to look like an innocent video, application, or website cookie. Sometimes malware can even be disguised as a exit button on an infected website. […]