Mobile Malware Plays Hide and Seek

      No Comments on Mobile Malware Plays Hide and Seek

Android/Obad.A is mobile malware that has been described as very complex. Truly it is one of the most complex we’ve seen because it: Uses Bluetooth to infect other Android devices Accepts commands from the attacker Hides from the Device Administration list This is a good collection of malicious activities for a modern piece of malware. Read more…

Mobile Malware Plays Hide and Seek

      No Comments on Mobile Malware Plays Hide and Seek

Android/Obad.A is mobile malware that has been described as very complex. Truly it is one of the most complex we’ve seen because it: Uses Bluetooth to infect other Android devices Accepts commands from the attacker Hides from the Device Administration list This is a good collection of malicious activities for a modern piece of malware. Read more…

Phishers Claim to Ensure Security for Digital Currency Users

Contributor: Avdhoot Patil
Digital currency, a form of electronic money, is a relatively new concept to the world. Many of these currencies have arisen during the past decade and digital currency in general has always been a subject of controversy. In …

10 Smart Tech Habits to Pass On To Your Kids

We teach them how to drive, how to cook, and how to find their way through tough situations. But parents today have added another task to their “essential parenting” list they must impart and that is: good tech habits. The role of technology in families is only growing. Tech has become a rather hefty line Read more…

An unusual AVAST spotting

      No Comments on An unusual AVAST spotting

When AVAST CTO, Ondrej Vlcek, was in Munich recently, he took an after-dinner stroll to see the Frauenkirche cathedral. Right next door to the cathedral is the Ferrari store, so he paused to do some window shopping. “Pretty standard stuff inside – lots of red t-shirts, red baseball hats and bunch of other clothing, plus […]

Cybercrooks use vacation posts to scam family members

Summertime means vacation time, and many of us brag share our plans on social networking sites like Facebook and Twitter. A recent survey by MoneyGram found that nearly one-third of consumers aged 18-49 post details about their vacations on social media before or during their trip, essentially broadcasting to the world when they will be […]

Vine: Spammers Find a New Home on Twitter’s Video Sharing Service

In late January of this year, Twitter released Vine, a social video-sharing service that it acquired in late 2012. Initially launched on iOS, Vine has similar characteristics to Twitter as videos are intentionally short (users are only allowed six seco…

Bitcoin Phishing Campaign Hits Trusted Search Engines

Sometimes it pays to wait to see how new technologies play out. Such is the case with Bitcoin — a virtual currency which allows users to purchase goods over the Internet. While the nascent currency is gaining a strong following of legitimate users, it still suffers from some key weaknesses. The most recent example comes Read more…

#useAVAST winners share recommendations with friends

Our first “#useAVAST” Hashtag challenge is over and it’s time to announce the results. As always, YOU have proven what an engaged and creative community AVAST has. We’ve seen plenty of Facebook and Google+ posts and Tweets with your personal recommendations. It has convinced us that we should be giving you this opportunity more often, […]