As we all know, what really matters at the end of the day in a security product is that it protects you against everything that tries to attack you. And with our most recent award from the prestigious AV-Comparatives Lab, we have received indepen…
Today is Safer Internet Day, and the spirit of this global holiday is to educate the young people on this planet on the ins and outs of safe, sane internet habits. Our children are growing up in a world where the internet is a basic creature comfort, o…
Do you remember where you were when it all began?
Fake Android photo apps booted off Google Play
Cybersecurity researchers identified dozens of fake apps on the Google Play Store intended solely for malicious purposes. The apps posed as Android photo enhancers, some claiming to beautify photos as the…
New year, new release: Our first 2019 product update of Avast Cleanup Premium for PC comes with a new Software Updater feature. This article explains why you need it and why you cannot trust Windows or any other third-party software makers to update th…
Citing a breach of agreement, Apple has revoked its distribution certificate from Facebook, abruptly powering down all apps using the intra-company iOS app distribution service. This does not mean that the Facebook app will stop working on your iPhone,…
Recently, an interesting vulnerability was discovered by French security researcher, Elliot Alderson, in the Android app ES File Explorer (version 4.1.9.7.4 and below). ES File Explorer is a file manager, which has been downloaded more than 100,000,000…
Staying ahead of threats and ensuring strong security protection within your budget are among the biggest challenges for today’s IT professionals. Good thing our Avast Business team has you covered. Starting this month, you can check out our solutions …
Our study continues: In our last blog covering the 2019 Avast PC Report, we glanced at the most important developments in the software space — for example, what types of software and Windows versions users have installed and how outdated both are. This…
Supply chain attacks may not be new, but they are evolving, thanks to smarter malware and more insidious tactics. Today’s reality is that there is a mounting magnitude of supply chain cyberattacks that are taking down small businesses, large enterprise…