It’s a landmark shift when our children leave the house to begin their lives as adults. As they pick up the last boxes and bags from their room and set out into the world, we give them love and encouragement…
Category: blog.avast.com EN
Too good to be true? That online auction price could be triangulation fraud
Do you crave the hunt for an online deal? When you decide that you want to buy a thing, is part of the satisfaction of acquiring it how good of a deal you can find? This article has been indexed…
Fleeceware drains money from account slowly over time – here’s how to spot it
If you’re anything like me, every few days you look at your credit card or bank transactions on your mobile and scroll through just to see if anything unusual jumps out at you. And more often than not, there’s nothing…
Why Whac-A-Mole is not a strategy for defending against ransomware attacks
Recently, I participated in a training exercise where a team of hackers (the red team) simulated an attack on an organization’s infrastructure, and a team of Cyber experts (the blue team) was tasked with responding to the incident and restoring…
Web-based adware’s crafty games and how to sidestep them
If you’ve ever been online (and, well, you’re here, so obviously you have), you’ve probably crossed paths with something called web-based adware. Let’s take a moment to unpack that. This article has been indexed from blog.avast.com EN Read the original…
New Report Finds Shift in Cyber Crime | Avast
Something is changing in the world of cybersecurity. In the first half of 2023, Avast researchers observed a notable shift in threat trends. While traditional consumer-focused cyber threats experienced a slight decline, social engineering, and web-related threats, such as scams,…
The 3 Cs of Renting vs Buying Ebooks | Avast
Well, it’s that time of the year again: Students are scrambling to find the cheapest version of their textbooks they can. And with textbook prices being as high as they are, most of us usually decide to just take the…
The 3 Cs of renting vs buying textbooks: Cost, convenience, and cybersecurity
Well, it’s that time of the year again: Students are scrambling to find the cheapest version of their textbooks they can. And with textbook prices being as high as they are, most of us usually decide to just take the…
Ebooks are cheap, but you might pay in other ways
The practice of buying textbooks is practically a scam itself. Spending hundreds of dollars twice a year for books that you’re not even guaranteed to use? No wonder so many students try to find cheaper alternatives. This article has been…
Unzipping the truth: The hidden dangers of .zip domains
We all love the convenience of the internet, right? But sometimes, it can be a bit like the Wild West, with new threats popping up where we least expect them. With that in mind, we want to talk about a…
A fan-made Mario game says ‘Lets-a-cryptomine’
The world’s most iconic plumber has been spotted as the subject of a fan-made video game that’s widely available for download across the internet—but keep reading before you go to download it. This article has been indexed from blog.avast.com EN…
Are my apps spying on me? A paranoid’s guide to digital life
Downloaded a weather app to your phone? You might think it’s no big deal, just a quick way to determine if you should grab your umbrella before heading out on a lunch date. But that weather app? It might be…
How scammers used SEO to disguise themselves as an electric utility
Summer is at its height, and it’s a good time to go sit by the pool with a glass of iced tea, go out and see that hugely promoted film in a nice cool theater, or maybe relax at home…
How to use Discord’s ‘Family Center’ to help protect your child
If your children are using the popular messaging platform Discord to connect with friends while playing games, they aren’t alone. Discord now has about 154 million active users who are 13 years of age and older. This online community is…
Unmasking HotRat: The hidden dangers in your software downloads
We all love a good deal, right? And what’s better than free? Would you like to get the last version of Microsoft Office or Adobe Photoshop? And what about some games like Age of Empires IV or Sniper Elite 4?…
Mario movie malware might maliciously mess with your machine
There are probably few among us who, never have they ever, downloaded questionable content. Whether it was a hit song in the Napster era or a Blockbuster movie you found on a “special” site online, you can probably think of…
How to use Wi-Fi to get your mother-in-law to go to therapy
You may have witnessed the social media trend of people talking to their significant others’ phones to influence their ad algorithms. Believe it or not, it isn’t that far-fetched, even if the exact method of talking to someone’s phone isn’t…
The hidden pitfalls of travel apps
Any seasoned traveler will know just how just how many single-use apps are downloaded over the course of an average vacation. These days, everything from watching movies on the plane to checking into your hotel or accessing your tickets to…
Avast researchers uncover disturbing crowdfunding scheme
The landscape of cybercrime is vast and constantly evolving, and cybercriminals are always coming up with new and novel ways to manipulate people. Avast’s cybersecurity researchers recently uncovered one such scheme, which involves a crowdfunding scam that preys on the…
Virus definition updates for Avast version 9/10/11 end in summer 2023
Updates for Avast version 9 — which was launched in 2014 — are being discontinued. Since we know that this change will affect the loyal Avast users who are still running version 9, we’ve put together a quick list of…
Safe summer travel: Your essential cybersecurity checklist
Hello, fellow travelers! As we prepare for the summer travel season, it’s crucial to remember that cybersecurity is just as important as packing your suitcase. As a cybersecurity expert with Avast, I’ve been asked to compile a comprehensive checklist to…
Don’t panic! These scammers don’t actually have photos of you
Imagine this: You open your email and find the following message: “I am a hacker, and I’ve gained access to your operating system. I’ve been watching you for months…” This article has been indexed from blog.avast.com EN Read the original article:…
Malicious extensions: Avast detects new threats on the Chrome Web Store
In the ever-evolving cybersecurity landscape, new threats emerge every day. Our team at Avast recently discovered a series of malicious browser extensions on the Chrome Web Store that are spreading adware and hijacked search results. These are significant threats, as…
The rise and fall of ransomware: Insights from Avast’s Q1/2023 Threat Report
What’s on your computer right now? Let’s make a list. Start with every work-related document you’ve used or created in the last six months. After that, perhaps your monthly budgets, pictures from your last vacation, all your passwords (in a…
Champions League: How to stay safe while streaming matches
Jan,* an Avast threat researcher, is a huge football fan (soccer, to any Americans reading), and he’s always trying to find ways to stream games that are airing outside of his native Czech Republic. But during the first matches of…
Protecting your business: Advice to SMB CEOs from a former CIO
The acronym CIO is sometimes understood to stand for “Career Is Over,” and here’s why: Business leaders in charge of information technology are not only tasked with driving automation, productivity, business intelligence, digitization, and cloud platforms, but often also with…
Don’t fall for it! How scammers are tricking businesses with fake invoices
Picture yourself in a position where you’re in charge of approving and paying capital expenses for a big-name company worth tens of billions of dollars. This article has been indexed from blog.avast.com EN Read the original article: Don’t fall for…
The rising trend of phishing on IPFS: What you need to know
Web3, often described as the next generation of the internet, promises a more decentralized and secure online experience. One of the key components of Web3 is the InterPlanetary File System (IPFS), a peer-to-peer (P2P) storage solution that allows for the…
AI-related threats: How should SMBs approach them?
At the end of 2022, the world was wrapping up a year that saw — among other major events — the unofficial end of the Covid-19 pandemic, the start of the war in Ukraine, and the passing of Queen Elizabeth…
Avast discovers and helps patch a major vulnerability
This article has been indexed from blog.avast.com EN Read the original article: Avast discovers and helps patch a major vulnerability
Scammers get sneaky: New malware distribution tactics revealed in Avast Threat Report
The first quarter of 2023 saw a notable rise in cyberattacks targeting trust in established tech brands Microsoft and Adobe, according to the Avast Q1 2023 Threat Report. The report also revealed a 40% increase in the share of phishing…
AV-Comparatives reveals top anti-phishing solutions
In the first quarter of 2023, phishing attacks made up 31.98% of all threats blocked by Avast. Despite this significant number, there remains a lack of tests evaluating how anti-malware software and browsers protect users against phishing threats. That’s why…
SMB cyber safety: De-risking catastrophic events
September 15, 2008: The bankruptcy of Lehman Brothers triggers a 4.5% one-day drop in the Dow Jones Industrial Average, then the largest decline since the attacks of September 11, 2001. This article has been indexed from blog.avast.com EN Read…
How to fortify your cryptocurrency security
In today’s uncertain economic climate, people are searching for alternative ways to invest and store their money. With high inflation rates during the last month and yet another crisis in the financial system, one option that has gained significant popularity…
The importance of independent third-party testing of anti-malware solutions
Being a part of the Threat Labs of one of the world’s most prominent security companies, you can imagine that securing our customers is at the center of our lives. We have fantastic teams working in different fields, from phishing…
Digital Home Hygiene Checklist | Avast
With any spring cleaning project, a checklist can help you remember all of the essential tasks for organizing, decluttering, and maintaining your physical home. The same is needed to keep your digital home spotless and secure. This article has been…
Anti-malware tests: How to interpret them
It can be overwhelming navigating the world of anti-malware software. With so many different products and test results out there, it can be difficult to know which one to choose in order to keep your computer and information safe. With…
2FA: Why to use it — and what are the best options?
In today’s digital age, it’s essential to protect your online accounts from hackers and cybercriminals. Unfortunately, the traditional method of protecting an account with just a password is still used by the vast majority of people. With the number of…
Cyber spring cleaning: Maintaining your digital home
Spring cleaning prompts many of us to refresh and reorganize our homes with an initial burst of enthusiasm. However, it’s the required maintenance that most of us falter on. So, much like for our physical homes, committing to a year-round…
Cyber spring cleaning: Decluttering your digital home
Spring cleaning provides the perfect opportunity to declutter both your physical and digital homes. Although digital clutter doesn’t leave a physical trace, it can undoubtedly take up significant mental space. A messy digital environment can trigger stress, hinder productivity, and…
New data extortion email campaign copying ransomware gang techniques
The Avast Threat Labs have identified a new data extortion scam targeting companies. The scam is designed to look like it’s coming from a ransomware or data extortion cyber gang and is sent via email to employees of different companies,…
Life finds a way: OneNote malware on the rise
Macro viruses have been a security nightmare for years. First appearing in 1995, they didn’t start gaining global popularity until 1999, when the Melissa virus showed up. Melissa virus was distributed via email attachments, and it quickly became the most…
AV-Comparatives Anti-Phishing Test | Avast
If an antivirus is doing its job, you never really have to think about it. It should be running in the background, protecting your devices from all types of attacks. But if that’s the case, how do you know it’s…
New Instagram scam uses fake SHEIN gift cards as lure
Avast researchers have detected a new scam targeting Instagram users from various countries including the UK, Australia, France, Spain, and Poland. This article has been indexed from blog.avast.com EN Read the original article: New Instagram scam uses fake SHEIN gift…
Cyber spring cleaning: Organizing your digital home
Spring cleaning season is among us, and that means tackling overstuffed drawers, orderless cabinets and overflowing closets. It’s time to tidy upthose neglected spaces not only in your physical home but in your parallel digital home as well. And we…
Carol Shaw: The groundbreaking career of this video game pioneer
Ever flown your jet fighter down the River of No Return to blow up enemy tankers, helicopters, jets and bridges? Then you’re familiar with the work of video game pioneer Carol Shaw. This article has been indexed from blog.avast.com EN…
SXSW 2023: Protecting your digital identity in cyber warfare
South by Southwest (SXSW) is one of our favorite events each year. Our team is always inspired by the variety of sessions and discussions with speakers and attendees who are driving change. At this year’s event, the Tech Track at…
Amazon call scams are on the rise — here’s what you need to know
Has someone claiming to be an account executive from Amazon ever called asking for your Amazon account number, credit card information, or Social Security number? Maybe they’ve claimed it’s to prevent fraudulent purchases on your account or to verify that…
(Ab)using Adobe Acrobat Sign to distribute malware
Bad actors have been distributing malware through email for decades. Over time, security technology has evolved and improved greatly, making this task harder for cybercriminals. 20 years ago, we witnessed the frequent distribution of email worms, which caused inboxes to…
Stalkerware has grown by 239% worldwide over the past three years
Over the course of the past three years, Avast researchers have discovered a diverse range of mobile applications intended for non-consensual stalking. This article has been indexed from blog.avast.com EN Read the original article: Stalkerware has grown by 239% worldwide…
Introducing Avast One Platinum
Like great home security systems, great cybersecurity is largely invisible. You want it to do its thing, running in the background, silently protecting you and your family. The only time you should be aware of it is when something goes…
How to safely file your taxes online
As tax season approaches, many people are starting to think about how they will file their taxes. If you’re like most people, you’re probably considering filing your taxes online. It’s convenient, fast, and can save you a lot of time…
IRS scams: How to avoid getting tricked
Tax season is upon us, and you know what that means: It’s time for IRS scams to start showing up. These scams take the form of anything from phishing emails to fake phone calls — and they can be difficult…
Best Practices for IT Service Providers | Avast
With the world expected to lose $10.5 trillion annually to cybercrime by 2025, many businesses are working to boost their IT security. Managed service providers (MSPs) are uniquely positioned to help SMBs protect against the biggest cyberthreats they face today.…
How to protect yourself against identity theft this tax season
Filing your taxes is already a drag, but finding out that someone has already filed a fake tax return in your name and is trying to steal your refund? That just takes the cake. This article has been indexed from…
Spoiler: It’s not the IRS calling
Have you ever gotten a call from the IRS? If you have, then you might be one of the thousands of people losing millions of dollars every year to IRS scam calls. These fraudulent calls, which claim to be from…
Is your online date Googling you?
There’s an old joke that “On the internet, nobody knows you’re a dog.” It’s originally from a 1993 cartoon in The New Yorker and while the internet looks a lot different from how it looked back then, it’s just as…
Taylor Swift ticket scams: How to stay safe
You’re a confirmed Swiftie: You love Taylor Swift and can’t wait to see her perform live. With each new tour, you’re eager to get your hands on tickets to experience the magic of seeing Miss Americana live. But Swifties aren’t…
Spoiler: It’s not the IRS calling
Have you ever gotten a call from the IRS? If you have, then you might be one of the thousands of people losing millions of dollars every year to IRS scam calls. These fraudulent calls, which claim to be from…
Is your online date Googling you?
There’s an old joke that “On the internet, nobody knows you’re a dog.” It’s originally from a 1993 cartoon in The New Yorker and while the internet looks a lot different from how it looked back then, it’s just as…
Smishing: The elephant in the room
Phishing is undoubtedly one of the most popular ways for cybercriminals to start a malicious attack, whether they’re looking to steal someone’s identity or distribute malware. Since the emergence of phishing, this attack vector has only been growing — and…
Tax-related identity theft: How to protect yourself
As the tax season approaches, it’s important to be aware of the potential for tax-related identity theft and scams. Unfortunately, these types of crimes are all too common, with scammers using various methods to steal personal information and commit fraud. …
Super Bowl ticket scams: Security tips for football fans
The Super Bowl is one of the most popular and highly anticipated events in the world of sports. Each year, millions of fans flock to the host city to witness the biggest game in American football. But, unfortunately, the hype…
Avast Threat Labs Q4 2022 Threat Report | Avast
The Avast Threat Labs Q4 2022 Threat Report observed a rise in social engineering attacks during the final quarter of 2022, including invoice and refund fraud, tech support scams, and others aimed at stealing money. Cybercriminals continued to engage in…
10 Tips for Securely Filing Taxes Online | Avast
Filing your taxes online can be a convenient and efficient way to get them done, but it’s important to be aware of the potential risks. For example, online filing potentially opens your personal information up to exposure in a data…
Online Dating Safety Tips | Avast
With Valentine’s Day looming on the calendar like a pulsing red heart, the online dating world is sure to experience a flutter of activity. But it’s not just lonely hearts who are flocking to the dating sites – unfortunately, predators…
Super Bowl ticket scams: Security tips for football fans
The Super Bowl is one of the most popular and highly anticipated events in the world of sports. Each year, millions of fans flock to the host city to witness the biggest game in American football. But, unfortunately, the hype…
W-2 phishing scams: Everything you need to know
It’s that time of year again – tax season – and, unfortunately, it’s also a peak time for phishing scams. Cybercriminals know that people are more likely to be filing their taxes and sharing sensitive information online, so they increase…
ChatGPT: Is its use of people’s data even legal?
In the world of AI and machine learning, the sudden massive popularity of language learning models is a hot topic. These tools — the current most popular of which is probably ChatGPT-3 — are language models that can answer specific…
W-2 phishing scams: Everything you need to know
It’s that time of year again – tax season – and, unfortunately, it’s also a peak time for phishing scams. Cybercriminals know that people are more likely to be filing their taxes and sharing sensitive information online, so they increase…
ChatGPT: Is its use of people’s data even legal?
In the world of AI and machine learning, the sudden massive popularity of language learning models is a hot topic. These tools — the current most popular of which is probably ChatGPT-3 — are language models that can answer specific…
AI in cybersecurity: The good, the bad, and the ugly
Artificial intelligence (AI) is rapidly becoming a powerful tool in the cybersecurity landscape, with the potential to revolutionize the way we detect and respond to cyber threats. However, as with any technology, there are also risks associated with the use…
Cryptocurrencies: How have they influenced cybercrime?
Cryptocurrencies have now been around for over a decade. Since their inception, they’ve been gaining traction as a legitimate form of currency. However, along with the rise in popularity of cryptocurrencies, there has also been a rise in the use…
Malicious USB devices: What are the risks?
It’s understandable that when people find a misplaced USB drive or memory stick, they want to find out what it contains. Human curiosity is what attackers exploit, after all. However, plugging an unauthenticated device into your own or work computer…
Cryptocurrencies: How have they influenced cybercrime?
Cryptocurrencies have now been around for over a decade. Since their inception, they’ve been gaining traction as a legitimate form of currency. However, along with the rise in popularity of cryptocurrencies, there has also been a rise in the use…
The dark web in 2023: What’s on it?
When it comes to the internet, most of us only scratch the surface. The vast majority of what we know and use on a daily basis is the “surface web,” which includes all the sites that can be easily accessed…
DDosia: A botnet created to facilitate DDoS attacks
The DDosia project is a successor of the Bobik botnet linked to the pro-Russian hacker group called NoName(057)16, as revealed in a recent analysis by Avast researcher Martin Chlumecky. The group targets DDoS attacks on private and public organizations in…
Antivirus exceptions: Think twice before making them
Have you ever allowed some “exceptions” to slip through the cracks, even after your security software warned you that it wasn’t safe to do so? Probably – it’s a safe bet that most people have. But while you might think…
Shopping scams: Scammers targeting secondhand shopping sites
Buying and selling secondhand items has become pretty popular, as there are some platforms that allow people to do it easily from home. One of these platforms is Vinted, which is a well known site in Europe and North America…
Smishing: The new year is here — and so are new scams
Smishing has become an increasingly popular attack method among cybercriminals – and they’re getting better at using it. This article has been indexed from blog.avast.com EN Read the original article: Smishing: The new year is here — and so are…