Category Archives: Consumer Alerts

Are you among the 1.4 billion usernames and passwords leaked on the darknet?

As you have probably heard, 1.4 billion usernames, passwords, and emails were leaked on the darknet. This wasn’t a new breach, but rather a collection of previous leaks all put together in one place, forming one of the largest consolidated databases ever discovered.

Part 3: How to best protect SMBs from cyberthreats

Cybersecurity is not a one-size-fits-all solution, especially for SMBs (small and medium-sized businesses) who need dynamic, flexible solutions that can identify the sneakiest of threats and adapt to the evolving trends in cybercrime. Some managed services providers (MSPs) have already realized this growing need and have implemented solutions that bring enormous benefits to their business as well as their clients’.

As secure as you can be—or, you can’t outrun a bear

In September, Apple launched its newest round of iPhones—the iPhone 8 and 8 Plus, with the iPhone X shipping in November—in what has become a familiar spectacle. In many ways, each launch is a snapshot of the technological developments that have recently come to the fore. Not necessarily new technology, exactly, but tech that will suddenly become very widespread and move beyond its creators’ intent, like a new species of creature created in a laboratory being released into the wild. As such, these markers provide a glimpse into the opportunities and challenges these advances present for society, not just the individual consumers.

Hurricane Irma puts spotlight on Avast Business partnership for Florida MSP

The customer
Boring Business Systems has been providing essential services to Florida businesses since 1924. In the beginning, they supplied typewriters and office equipment. Today they have expanded this focus to network services. The company has gr…

Avast blocked more than 34 million Monero cryptomining attacks

On Sunday, December 3rd, we saw a peak in one of our detections, JS:Miner-I, which blocks a cryptocurrency miner that uses the cryptonight algorithm to mine Monero, a popular cryptocurrency. The algorithm is suitable for using PC CPU for mining, and the miner is run using JavaScript. We blocked JS:Miner-I from launching on our users’ PCs, preventing 34.7 million attacks in just one day. The extreme peak wasn’t the only thing that caught our attention; all the detections were launched within Google’s Chrome browser.