For as long as there’s been an internet, there’s been cybercrime. Real-world criminal activity is mirrored in our digital lives. In both worlds, you find stalking, theft, extortion, destruction of property, and scams and schemes galore. And while we co…
Authors: Martin Hron and David Jursa
The tech world evolves. The ones who wear black hats get smarter, and the ones who wear white hats get even smarter. Using AI, machine learning, and the big data of our vast network, we’re proud to be forerunners in the latter category, staying a step …
Authored by Alena Nohová & Vlad Iliushin
Danabot opens a US account
After making its presence felt in Australia and European banks, Danabot, a modular Trojan horse has made its way to the States. Written in Delphi, the perpetual beta modular malware can take screenshots, log keys and stealin…
Swiss Army Knife malware gets 7 additional modules
written by Jakub Kroustek, Vladislav Iliushin, Anna Shirokova, Jan Neduchal and Martin Hron
Disclaimer: Analysis of the server content and samples was done on Thursday, September 20th. Follow the Avast Blog for further updates.&nbs…
Most of us have experienced an overheated cell phone, particularly that radiating warmth after a conversation that went on extra-long. But what are some of the other causes why phones get so hot? Sometimes to the point where it won’t function until it …
All-in-one super malware hits the internet
A self-propagating malware mashup has been found lurking online. Called Xbash, the all-in-one malware is thought to be made by crime syndicate Iron Group and boasts of botnet, ransomware, diskwiper, cryptojac…
By now, you should be familiar with that sudden bout of uncertainty as you are gearing up to install a new application. How do you check if an Android app is safe to install? Does it have a virus? What does a malware app even look like? If you have eve…