Gone are the days when you had to click to “accept” a download or install a software update in order to become infected. Now, just opening a compromised web page could allow dangerous code to install on your device. You just need to visit or “drive by” a web page, without stopping to click or Read more…
You’ve felt it. That tiny nagging of a feeling making you doubt for a second whether or not you should post what you’re doing on Twitter, share that picture of your new car (including the license plate, shall I mention) on Facebook, or tag your location in an Instagram photo. But that’s just the beginning! Read more…
Results of the AV-Comparatives 2013 Security Survey (pdf) are in, and once again AVAST leads among consumer preferences. Since AV-Comparatives is an independent testing firm, we always look forward to what they have to say. Here are some highlights: According to survey respondents, AVAST remains the most widely used antivirus solution worldwide, claiming first […]
Everyone knows that change is not easy. When a decision is difficult, people tend to go with the status quo or choose to do nothing. So when we decided to update the look of Avast for version 8, we first had to get through the challenge of change. One of the most important aspects […]
Users experienced widespread delays and outages in Internet service around the world this week after a group called Spamhaus made a new addition to its spam blacklist—a Dutch company called Cyberbunker. Email service providers (like Gmail or Hotmail) use blacklist services like Spamhaus to separate likely spam messages from legitimate mail, and as it turns Read more…
Following the lead of companies like Facebook, Google, and Microsoft, Apple last week announced two-step verification (also known as two-factor authentication) to help customers secure their Apple IDs against hackers. Unfortunately, just a day later, a major new security hole was discovered that affected any customer who had not implemented their new two-step security feature. Read more…
Another wave of Facebook phishing is spreading among Facebook users. Imagine you get a message from another Facebook user with a link to a new amazing Facebook app. Even if the sender is not your friend, you decide to go to the link. Instead of an application you see a fake Facebook login page. But […]
Most of us are aware of spam, and while we may think it’s just an annoyance, what’s really dangerous about it is the fact that most spam are phishing attempts. Phishing is when cybercriminals attempt to fraudulently acquire your personal information, such as passwords and credit card details, by masquerading as a trustworthy person or Read more…
By now, avast! users are aware of the importance of creating strong computer passwords, and guarding their Social Security number like a trained Doberman. But what about the humble four-digit PIN number? Personal identification numbers (PINs) are security features just like passwords. They give access to your mobile phone, credit card, bank account, and numerous […]