Constant pursuit. Near captures. Repeated escapes. Hackers and their targets seem to be caught in this unending loop of cat-and-mouse action. The hackers pursue incessantly, and while their targets may sometimes escape, at other times they’re not so lucky. How can we change the game?
Meet our Network Operation Center. Its main display is an enormous world map that constantly receives new information about malware threats from over 400 million sensors around the globe. The map displays points of light, representative of the cities in which our protected users reside. (User location is approximated from their IP addresses.) The info this map receives essentially arrives in real time, or within four seconds. When a threat is detected, we immediately take action to identify and block the cyberattack. This aggressively proactive defense is necessary, and it’s made possible using AI-based and machine learning technology—what we call “next-gen cybersecurity.”
Thousands of enterprise IT stakeholders, industry professionals, and tech-curious consumers will gather in San Francisco at the Moscone Center next week for the first Mobile World Congress Americas (MWCA) event. There will be over 1,000 exhibitors from…
Today, I have the great honor to introduce Avast Business, the combination of the best of AVG and Avast. Since last year, our focus has been on combining the best of both business product portfolios, partner programs, tools, and systems to eliminate th…
As we approach the one year anniversary of our acquisition of AVG, we are thrilled to announce another key milestone in integrating the two companies—a new product portfolio designed to deliver security and peace of mind to our business customers.
Cybersecurity is a critical priority for small and medium businesses (SMBs) and will continue to be for the foreseeable future. Just last year, cybercrime cost the global economy more than $450 billion, and that number is expected to rise into the tril…
At this point it’s clear that our lives are becoming increasingly digital. We use the internet and apps for everything from books to banking, entertainment to education, healthcare to hailing a cab, and shopping to socializing. Along with the rise of voice-assisted technologies and the growth of the Internet of Things (IoT), this trend continues to accelerate at breakneck speed right before our very eyes. And that’s why Avast is proud to sponsor the Enigma Interviews, an event organized by The Parallax, happening this week in San Francisco.
Use a smartphone? Then surely you’re using a security product to protect it… to protect YOU, right? In case you’re looking, here’s one that aced the exam across the board.
Most of today’s malware goes through automated modification, upgrade, and re-deployment so frequently and quickly that machine learning is a vital security solution component. Machine learning allows a system to learn from data and observation automatically. The most effective machine learning occurs when the learnings are gained via big data: the more information we feed our machines, the more accurately they identify trends and create models. This is true not only in security, but in every area that uses machine learning.
You may have read about our cool crypto challenge at Def Con here on our blog two weeks ago and may be wondering who won the prize (HackRF One).