A YouTube video called Movies vs. Life compares scenes embellished with movie magic to their real-life equivalents. We like to think that an avast! Antivirus cameo during a computer hacking scene (pay attention around 0:22 seconds) is one of the reasons that this hilarious video has gone viral. A round of applause from avast! to […]
Imagine this: You’re walking past your favorite store and your phone buzzes to ask you if you like the new spring collection. Or maybe it wants to know what you think about the new running shoes displayed in the storefront just up ahead. Conversations with your phone aren’t just something to imagine anymore; recently companies Read more…
We come across a plenty of malware reports every day. Sometimes we have to deal with some special cases, where a respected vendor is involved. This time it was the Dell driver download site. The “Download file” link leads to this unexpected screen (our user complained about a false positive): Well, being an average user, […]
As you may recall from earlier posts in my blog, a denial-of-service (DDoS) attack occurs when hackers flood a target website with large amounts of traffic. This traffic is often generated through the hacker’s botnet, or network of infected computers. Usually, when a cybercriminal launches a DDoS attack on a website, there isn’t much for Read more…
Once you start using avast! Free Antivirus, you quickly realize what a quality product it is and want to share it with your family members and friends. We have created an easy way for you to recommend avast!, and at the same time earn points toward a free 1-year license of avast! Internet Security. The […]
New research has concluded that despite best efforts to keep search results clean, Google and Bing often serve malware-infected sites among their top search results. This malware (or malicious software) can include sites infected with viruses, Trojans, computer worms, and more, making it extremely important for consumers to pay close attention to what they click. Read more…
Seventy-three year old Menachem Bodner lost his twin brother Jeno (Jolli) 68 years ago when the Auschwitz concentration camp was liberated. He knows only one thing about his brother: The Auschwitz ID number tattoed on his arm – A 7734. With the help of his grandchildren and genealogist Ayana KimRon, Mr. Bodner is now using […]
According to a recent survey, nearly half of all consumers believe that their smartphones and other mobile devices are less secure than their laptop or desktop computers. In the same survey, only 36% of respondents said they trust online retail sites to keep their personal data safe. Still, holiday shopping from mobile phones increased by Read more…
We’ve always been told to “read the fine print before you sign on the dotted line,” but let’s be frank. In today’s digital world, all we want to do is play that new game, test that new app and hear that new song. The fine print seems like an unnecessary barrier to our fun. Most Read more…
“Malware” is a shortened version of the words malicious software. It is defined as: a generic term used to describe any type of software or code specifically designed to exploit a computer/mobile device or the data it contains, without consent. Most malware is designed to have some financial gain for the cybercriminal. Whether they are Read more…