Category Archives: Consumer Alerts

The Defense Department Lists Mobile Security as a Top Priority

Does your organization prioritize mobile security? According to recent news, even the U.S. Department of Defense (DOD) is concerned about mobile security and the ability to securely transfer information between mobile devices. This is no small task for the DOD: according to the American Forces Press Service, the DOD has over 600,000 commercial mobile devices Read more…

How to change the voices in avast! Antivirus

Question of the week: Is it possible to change the woman’s voice to a man’s in AVAST? One of the most commented upon features of avast! Antivirus is the female voice of our notifications. The familiar message AVAST virus database has been updated is heard by nearly 200 million AVAST users around the world every […]

Two Steps are Better Than One: Make a Hacker’s Job Harder with Two-step Verification

Every day, life for many consumers has become more “digital” than before—this has made day-to-day tasks easier for many of us, but it also creates new challenges. From online banking to medical records, the need to protect our private, personal information is imperative. Too often, the same password is used for multiple online accounts—for instance, Read more…

5 More Mobile Security Tips

      No Comments on 5 More Mobile Security Tips

A cybercriminal’s full time job is creating new crimes, and he or she will make full use of technology to hide their activities to fool you. And with mobile devices, this is no different. The threat to our mobile devices is also high because our smartphones are always connected, they usually carry some personal data, Read more…

Android users beware: Obad.a is out there

Your smartphone knows everything about you but is your information safe? From banking to global positioning system (GPS), there are many reasons to protect the personal data on your mobile device. Hackers are targeting the Android operating system and there are steps you should be taking to protect yourself. Malware is a generic term used Read more…

Smart Perimeter – A Security Fence For Your Digital Devices

Everyone has experienced that gut-wrenching feeling when you look around and realize that one of your prized possessions is missing.  Whether it’s your wallet, keys, or smartphone, that feeling of panic and loss is devastating.   In today’s digitally connected world that feeling has become incredibly too common. In a recent Digital Assets survey, McAfee discovered Read more…

Browser Toolbars – almost malware?

      No Comments on Browser Toolbars – almost malware?

by Thomas Salomon, head of AVAST Software ‘s German Software Development team In a previous blog post we wrote about the statistics from avast! Browser Cleanup. These statistics have become even worse: More than 1,000,000 (one million!) browser add-ons are available for the three main browsers More than 82% of all add-ons have a bad […]

Obad.a – What You Need to Know About the Latest Android Threat

With the convenience of our mobile apps, we increasingly rely on our phones for work and play.  But did you know that those same apps might be leaving you vulnerable to some nasty mobile viruses? The worst type of malware, software that damages your computer or mobile, is a Trojan.  Trojans are a particularly insidious Read more…

avast! SecureLine makes free WiFi safer

This summer, lots of us will be chilling out by the pool at hotels around the world,  surfing the Internet and checking email. Along with a burger and fries, 11,500 McDonalds are now serving up free WiFi so customers can access the Internet using their laptops, smartphones, or tablets at no charge. You can sip […]

Facebook virus empties bank accounts

A dangerous Trojan named ZeuS is making its way among Facebook users. This old Trojan horse has infected millions of computers over the years, stealing banking credentials and other personally identifiable information. Zeus can lie dormant on infected computers until the unsuspecting victim logs into their bank’s website. Once you’re logged in, cybercrooks can steal […]