Apple’s “Gatekeeper” in Mac OS X vulnerable to simple bypass
Researcher Patrick Wardle details security weakness in Apple’s “Gatekeeper” in Mac OS X that could allow attackers to run unverified, unsigned code.
Read More
Researcher Patrick Wardle details security weakness in Apple’s “Gatekeeper” in Mac OS X that could allow attackers to run unverified, unsigned code.
Read More
Avast Free Antivirus just received another AV-Test certification for its stellar protection against real-world threats, performance in daily use, and usability. Yay! It’s like collecting another trophy for the display case or another blue ribbon to hang on the wall, but what does it really mean? How is this type of testing useful for […]![]()
Significant behavioral changes made to the Android mobile operating system have affected malware and how it applies to non-rooted devices.Read More
Cybersecurity is not limited to your office or home. Nowadays, many of us use the same devices for work and personal business, so when traveling we need to be extra diligent to protect our devices and the data we have on them. If you use common sense and a bit of Avast technology, all your […]![]()
Some days ago we wrote about scams targeting senior citizens. This group is at risk because generally speaking, they have less computer education than younger people who have grown up in the digital world. I recommended the reading to my mother, thinking she will benefit from it. She thanked me, but said that there were “some things” she […]![]()
Kovter マルウェアの亜種は、レジストリ内にのみ潜んで検出をすり抜けるという Trojan.Poweliks の画期的な手口を初めて模倣しています。
Read More
詐欺師は、侵入した Instagram アカウントを悪用してフィッシングサイトでログイン情報を集め、アンケート詐欺でお金を稼ごうとしています。
Read More
Scammers rob elderly victims of an estimated $3 Billion per year. A scam that has been around since at least 2008 is still active and targeting elderly folks. Seventy-four year old Avast evangelist, Bob Gostischa, who knows a thing or two about scams, security, and privacy, received a call just yesterday from a scam artist […]![]()
A variant of the Kovter malware is the first to use Trojan.Poweliks’ pioneering tricks by residing only in the registry to evade detection.
Read More
Revision Note: V1.0 (September 24, 2015): Advisory published.Summary: Microsoft is aware of four digital certificates that were inadvertently disclosed by D-Link Corporation that could be used in attempts to spoof content. The disclosed end-entity cert…