Proof-of-concept threat is reminder OS X is not immune to crypto ransomware
Symantec analysis confirms that in the wrong hands, Mabouia ransomware could be used to attack Macs.Read More
Symantec analysis confirms that in the wrong hands, Mabouia ransomware could be used to attack Macs.Read More
There’s more than one RAT On Friday, I discovered OmniRat, a program similar to DroidJack. DroidJack is a program that facilitates remote spying and recently made news when European law enforcement agencies made arrests and raided the homes of suspects as part of an international malware investigation. OmniRat and DroidJack are RATs (remote administration tools) […]![]()
Serves as a reminder to app developers to only use verified versions of Apple’s integrated development environment.
Read More
In addition to the launch of the latest and greatest version of Avast Mobile Security, we’ve also got a few more important announcements about the app. The major news is this: we’re unlocking Avast Mobile Premium for every user! Information for current premium users Have you subscribed to the premium version of Avast Mobile Security […]![]()
Avast simplifies how you protect your privacy with new products for 2016. Count the number of devices you own. If you are like most modern digital-age people, you have a smartphone, half of you own a tablet, and most all of us have a desktop or laptop computer connected through a home router. Now think […]![]()
Today Symantec introduces the new Policy Based Encryption Essentials functionality to the Email Safeguard and Email and Web Safeguard plans of Email Security.cloud.
This new functionality will give customers the ability to push encrypted messages to recipients with no dependencies on encryption technologies supported by the third party. Policy Based Encryption Essentials will be available to all new and existing Email Safeguard and Email and Web Safeguard customers, or any customer provisioned with the Email Data Protection service.
Additionally, Symantec is simplifying our encryption options for Email Security.cloud by reducing to a single encryption provider. The Policy Based Encryption (E) add-on service will be enhanced and renamed to Symantec™ Policy Based Encryption Advanced.
The Policy Based Encryption Advanced add-on will continue to be fully brandable and will support existing Push and Pull encryption methods along with new encryption technologies which will help ensure that enterprises can communicate securely with each other, no matter which encryption platforms they have.
These new features will be available to existing PBE E customers and new customers who purchase the Policy Based Encryption Advanced add-on. Policy Based Encryption Advanced requires the Email Security.cloud Email Safeguard plan, Email and Web Safeguard plan, or Email Data Protection.
To learn more about the new features available in Policy Based Encryption Advanced, download the data sheet.
We’re happy to announce that Avast Free Antivirus on Windows 10 64-bit has been certified by ICSA Labs! After being tested in the ICSA Labs Anti-Virus Certification Testing Laboratory, Avast Free Antivirus on Windows 10 64-bit has satisfied the requirements for the Desktop Server AV Detection module within the Anti-Virus Corporate Certification Testing Criteria. The […]![]()
Twenty Android mobile phones were intentionally lost in The Lost Phones social experiment that Avast security analysts ran for 5 months. The story is about how Avast Anti-Theft was able to track the phones and follow the journey that some of them took after being found. But four of those phones were returned to Avast […]![]()
We trust our free app Avast Anti-Theft to track down lost phones, but we wanted to put it to the test in a real-world situation. So five months ago, we bought 20 Android smartphones and installed three security apps on all the phones: Our free Avast Anti-Theft app, Lookout Mobile Security, and Clean Master. Each […]![]()
Many of us have found ourselves in situations in which we need Wi-Fi connection and are unable to find it easily. Since we’ve become used to being connected to safe and steady Wi-Fi networks at home or in the office, it can become frustrating and inconvenient when we’re unable to establish a quick connection and […]![]()