Kovter malware learns from Poweliks with persistent fileless registry update
A variant of the Kovter malware is the first to use Trojan.Poweliks’ pioneering tricks by residing only in the registry to evade detection.
Read More
A variant of the Kovter malware is the first to use Trojan.Poweliks’ pioneering tricks by residing only in the registry to evade detection.
Read More
Revision Note: V1.0 (September 24, 2015): Advisory published.Summary: Microsoft is aware of four digital certificates that were inadvertently disclosed by D-Link Corporation that could be used in attempts to spoof content. The disclosed end-entity cert…
This past weekend, Prague hosted hundreds of web professionals at the Webexpo conference. Avast Software was a proud general sponsor of this event. Attendees could meet our team at the Avast booth, try Avast technologies, and chat with our colleagues. They could also learn first hand how it is to work for the Best Czech Employer of […]![]()
Last week, we sat down with Alan Scott of the Mid-Valley Literacy Center at Avast’s headquarters. During his time visiting Prague, Alan enjoyed exploring the city and visiting some of its museums in order to escape the (somewhat unexpected) September heat. Located in Keizer, Oregon (USA), the Mid-Valley Literacy Center’s mission is to empower adults […]![]()
Scammers are using compromised Instagram accounts to phish for login credentials and earn money through survey scams.Read More
While the rest of us were soaking up the last of the season’s sunshine, Apple researchers spent the weekend removing hundreds of malicious apps for iPhone and iPad from the iOS App Store. “The recent exploit on Apple has shown us that even Apple’s system can be compromised quite easily,” said Avast security researcher Filip […]![]()
Revision Note: V47.0 (September 21, 2015): Added the 3087040 update to the Current Update section.Summary: Microsoft is announcing the availability of an update for Adobe Flash Player in Internet Explorer on all supported editions of Windows 8, Windows…
Apple 製品をお使いのユーザーは、iOS と Mac OS X を更新してください。ユーザーがまったく操作しなくても脆弱性を悪用される恐れがあります。
Read More
Apple users advised to update iOS and Mac OS X as successful exploit requires no user interaction.Read More
Recently, an alarming vulnerability has cropped up on iOS devices. This security loophole allows an attacker to overwrite arbitrary files on a targeted device and, when used in combination with other procedures, install a signed app that devices will trust without presenting a warning notification to users. In a recent article published on Threatpost, it’s […]![]()