Contributor: Avdhoot Patil
New methods to entice victims into handing over their personal information are always being devised by the people behind phishing websites and the use of fake social networking applications is always popular.
During the past …
One threat has evolved and dominated the threats landscape like no other: botnets. Practically every day a new set of online criminals attempt to exploit users in some way or the other. The best way to stop this threat at the perimeter is to identify its communication channel and block the bot from connecting to Read more…
One threat has evolved and dominated the threats landscape like no other: botnets. Practically every day a new set of online criminals attempt to exploit users in some way or the other. The best way to stop this threat at the perimeter is to identify its communication channel and block the bot from connecting to Read more…
Results of the AV-Comparatives 2013 Security Survey (pdf) are in, and once again AVAST leads among consumer preferences. Since AV-Comparatives is an independent testing firm, we always look forward to what they have to say. Here are some highlights: According to survey respondents, AVAST remains the most widely used antivirus solution worldwide, claiming first […]
Everyone knows that change is not easy. When a decision is difficult, people tend to go with the status quo or choose to do nothing. So when we decided to update the look of Avast for version 8, we first had to get through the challenge of change. One of the most important aspects […]
Users experienced widespread delays and outages in Internet service around the world this week after a group called Spamhaus made a new addition to its spam blacklist—a Dutch company called Cyberbunker. Email service providers (like Gmail or Hotmail) use blacklist services like Spamhaus to separate likely spam messages from legitimate mail, and as it turns Read more…
A lot of malware modify themselves to either hide from security software when they copy themselves to the compromised computer or to hinder engineers attempting to analyze the malware by executing the decrypted memory area and reading the decrypted mem…
The #1 question asked by parents when I present for McAfee’s Online Safety for Kids program, is “Where do I go to find out information about what my kids are doing online?” It’s no secret that kids (especially teenagers) can be less than forthcoming about their online behavior. That’s where I come in. I have Read more…
Wie eine Naturgewalt sind die sozialen Medien über uns hereingebrochen. Sie sind allgegenwärtig, und doch ist ihre derzeitige Beliebtheit vielleicht nur der Anfang. Mit welchem Einsatz Millionen Menschen um das jeweils aktuelle Smartphone k&a…