One of the largest tech companies in the world, the U.S. government, and cybersecurity professionals are all fervently urging computer users to apply an easy patch that could prevent a vulnerability known as BlueKeep from becoming a major cybersecurity…
Do you get suspicious emails claiming to be from real companies? Do they guide you to websites that appear real – except for strange details? You’re not alone. The most costly cybersecurity threat, according to the newly released “Internet Crime R…
Below you will find the most recent trends we are seeing the market worldwide. You can also check out the highlights from previous reports below.
There is a terrible new malware invading Android devices and using dirty tricks to steal users’ online banking info. Avast Threat Labs worked with SfyLabs to uncover and expose this malware, dubbed Catelites Bot. The malware is similar to a Russian outbreak earlier this year, where cybercriminals successfully stole over $900,000. (That malware was called “CronBot”—which shares similarities with the original Catelites Bot.)
Plane tickets? On the table. Gifts? Ready to go. Suitcase? Packed. Carry-on? Fully stocked with ginger candy, crossword puzzles, and your laptop or tablet. Now, quick question—did you prep your device for this trip?
As you have probably heard, 1.4 billion usernames, passwords, and emails were leaked on the darknet. This wasn’t a new breach, but rather a collection of previous leaks all put together in one place, forming one of the largest consolidated databases ever discovered.
Last week’s episode, like most Mr. Robot episodes, included a flashback and jumped back and forth in time.
The independent IT-security institute AV-TEST evaluated twenty-one home user security products through September and October 2017. Avast Free Antivirus passed with flying colors, successfully protecting against ALL of the 9,999 malicious files thrown a…
On Sunday, December 3rd, we saw a peak in one of our detections, JS:Miner-I, which blocks a cryptocurrency miner that uses the cryptonight algorithm to mine Monero, a popular cryptocurrency. The algorithm is suitable for using PC CPU for mining, and the miner is run using JavaScript. We blocked JS:Miner-I from launching on our users’ PCs, preventing 34.7 million attacks in just one day. The extreme peak wasn’t the only thing that caught our attention; all the detections were launched within Google’s Chrome browser.
I don’t know about you guys, but this episode was an emotional one for me. As happy as I was to see Leon back, chatting away about Frasier and Knight Rider, I knew no good could come out of him being back.