Although some change can be great, we’re not always thrilled when modifications are made to things we’ve become accustomed to expecting. It’s easy to get thrown off when your local supermarket relocates the produce section across the store, or when a go-to dish is removed from the menu at your favorite restaurant. And many of Read more…
Keeping kids safe while they are online is a major concern for educational institutions from schools to libraries to museums. Schools in the United States spend a lot of money on education technology—it was estimated at $56 billion dollars in 2012. That’s about $400 per student per year. A portion of that is earmarked for […]
These days, it’s not uncommon for us to connect to Wi-Fi wherever we go. In fact, we’ve come to expect there will be a Wi-Fi connection—at hotels, coffee shops, airports, and now even on some flights—pretty much everywhere. While the ability to connect just about anywhere is convenient, it also has opened the door for Read more…
Personal contacts, photos, videos, apps, emails, text messages — smartphones today contain a plethora of personal information, and the thought of losing or having a smartphone stolen is extremely worrisome to many people. Our security research team recently conducted a survey of 167,904 customers worldwide and found that consumers in the United States are among […]
It’s difficult sometimes to think what many of us did before Twitter. How did we find out about the latest breaking news on a storm, local crime, or the next backlash in the Perez Hilton / Lady Gaga feud? We used to have to wait hours for a story to be reported on T.V. or Read more…
By now, many smartphone users know that a first step to securing their mobile data is to lock their phones with some sort of passcode, the most common method being the four-digit PIN. Admittedly, a PIN code seems pretty safe and practically impossible for a human to break—considering the time it would take to manually Read more…
A new threat for the Linux platform was first mentioned on August 7th by RSA researchers, where it was dubbed Hand of Thief. The two main capabilities of this Trojan are form-grabbing of Linux-specific browsers and entering a victim’s computer by a back-door. Moreover, it is empowered with features like anti-virtualization and anti-monitoring. With the […]
You have downloaded the new avast! Mobile Security version 3. You now have a powerful tool to protect your mobile phone from malware, as well as anti-theft features in case your phone is lost or stolen. But you may be wondering, “How do I use this mobile security software to its full power for maximum […]
To celebrate the new version of our top-rated avast! Mobile Security along with the new avast! Mobile Premium, AVAST and Android Police are giving away 9 new Nexus devices. You have one week to enter the contest to win one of these great Android phones or tablets: 2x Nexus 4 8GB 2x Nexus 4 16GB + bumpers + charging orb (2 bundles) […]
More than 25 million Android smartphone and tablet users protect their precious devices with AVAST’s free security app. Today, we are happy to provide even more awesome features in our new premium version, avast! Mobile Premium. The security of data on mobile devices is a growing concern. Over a quarter (26%) of mobile phone owners […]