Tag: blog.avast.com EN

The hidden pitfalls of travel apps

Any seasoned traveler will know just how just how many single-use apps are downloaded over the course of an average vacation. These days, everything from watching movies on the plane to checking into your hotel or accessing your tickets to…

Avast researchers uncover disturbing crowdfunding scheme

The landscape of cybercrime is vast and constantly evolving, and cybercriminals are always coming up with new and novel ways to manipulate people. Avast’s cybersecurity researchers recently uncovered one such scheme, which involves a crowdfunding scam that preys on the…

Protecting your business: Advice to SMB CEOs from a former CIO

The acronym CIO is sometimes understood to stand for “Career Is Over,” and here’s why: Business leaders in charge of information technology are not only tasked with driving automation, productivity, business intelligence, digitization, and cloud platforms, but often also with…

AV-Comparatives reveals top anti-phishing solutions

In the first quarter of 2023, phishing attacks made up 31.98% of all threats blocked by Avast. Despite this significant number, there remains a lack of tests evaluating how anti-malware software and browsers protect users against phishing threats. That’s why…

SMB cyber safety: De-risking catastrophic events

September 15, 2008: The bankruptcy of Lehman Brothers triggers a 4.5% one-day drop in the Dow Jones Industrial Average, then the largest decline since the attacks of September 11, 2001.   This article has been indexed from blog.avast.com EN Read…

How to fortify your cryptocurrency security

In today’s uncertain economic climate, people are searching for alternative ways to invest and store their money. With high inflation rates during the last month and yet another crisis in the financial system, one option that has gained significant popularity…

Digital Home Hygiene Checklist | Avast

With any spring cleaning project, a checklist can help you remember all of the essential tasks for organizing, decluttering, and maintaining your physical home. The same is needed to keep your digital home spotless and secure. This article has been…

Anti-malware tests: How to interpret them

It can be overwhelming navigating the world of anti-malware software. With so many different products and test results out there, it can be difficult to know which one to choose in order to keep your computer and information safe. With…

2FA: Why to use it — and what are the best options?

In today’s digital age, it’s essential to protect your online accounts from hackers and cybercriminals. Unfortunately, the traditional method of protecting an account with just a password is still used by the vast majority of people. With the number of…

Cyber spring cleaning: Maintaining your digital home

Spring cleaning prompts many of us to refresh and reorganize our homes with an initial burst of enthusiasm. However, it’s the required maintenance that most of us falter on. So, much like for our physical homes, committing to a year-round…

Cyber spring cleaning: Decluttering your digital home

Spring cleaning provides the perfect opportunity to declutter both your physical and digital homes. Although digital clutter doesn’t leave a physical trace, it can undoubtedly take up significant mental space. A messy digital environment can trigger stress, hinder productivity, and…

Life finds a way: OneNote malware on the rise

Macro viruses have been a security nightmare for years. First appearing in 1995, they didn’t start gaining global popularity until 1999, when the Melissa virus showed up. Melissa virus was distributed via email attachments, and it quickly became the most…

AV-Comparatives Anti-Phishing Test | Avast

If an antivirus is doing its job, you never really have to think about it. It should be running in the background, protecting your devices from all types of attacks. But if that’s the case, how do you know it’s…

New Instagram scam uses fake SHEIN gift cards as lure

Avast researchers have detected a new scam targeting Instagram users from various countries including the UK, Australia, France, Spain, and Poland.  This article has been indexed from blog.avast.com EN Read the original article: New Instagram scam uses fake SHEIN gift…

Cyber spring cleaning: Organizing your digital home

Spring cleaning season is among us, and that means tackling overstuffed drawers, orderless cabinets and overflowing closets. It’s time to tidy upthose neglected spaces not only in your physical home but in your parallel digital home as well. And we…

(Ab)using Adobe Acrobat Sign to distribute malware

Bad actors have been distributing malware through email for decades. Over time, security technology has evolved and improved greatly, making this task harder for cybercriminals. 20 years ago, we witnessed the frequent distribution of email worms, which caused inboxes to…

Introducing Avast One Platinum

Like great home security systems, great cybersecurity is largely invisible. You want it to do its thing, running in the background, silently protecting you and your family. The only time you should be aware of it is when something goes…

How to safely file your taxes online

As tax season approaches, many people are starting to think about how they will file their taxes. If you’re like most people, you’re probably considering filing your taxes online. It’s convenient, fast, and can save you a lot of time…

IRS scams: How to avoid getting tricked

Tax season is upon us, and you know what that means: It’s time for IRS scams to start showing up. These scams take the form of anything from phishing emails to fake phone calls — and they can be difficult…

Best Practices for IT Service Providers | Avast

With the world expected to lose $10.5 trillion annually to cybercrime by 2025, many businesses are working to boost their IT security. Managed service providers (MSPs) are uniquely positioned to help SMBs protect against the biggest cyberthreats they face today.…

Spoiler: It’s not the IRS calling

Have you ever gotten a call from the IRS? If you have, then you might be one of the thousands of people losing millions of dollars every year to IRS scam calls. These fraudulent calls, which claim to be from…

Is your online date Googling you?

There’s an old joke that “On the internet, nobody knows you’re a dog.” It’s originally from a 1993 cartoon in The New Yorker and while the internet looks a lot different from how it looked back then, it’s just as…

Taylor Swift ticket scams: How to stay safe

You’re a confirmed Swiftie: You love Taylor Swift and can’t wait to see her perform live. With each new tour, you’re eager to get your hands on tickets to experience the magic of seeing Miss Americana live. But Swifties aren’t…

Spoiler: It’s not the IRS calling

Have you ever gotten a call from the IRS? If you have, then you might be one of the thousands of people losing millions of dollars every year to IRS scam calls. These fraudulent calls, which claim to be from…

Is your online date Googling you?

There’s an old joke that “On the internet, nobody knows you’re a dog.” It’s originally from a 1993 cartoon in The New Yorker and while the internet looks a lot different from how it looked back then, it’s just as…

Smishing: The elephant in the room

Phishing is undoubtedly one of the most popular ways for cybercriminals to start a malicious attack, whether they’re looking to steal someone’s identity or distribute malware. Since the emergence of phishing, this attack vector has only been growing — and…

Tax-related identity theft: How to protect yourself

As the tax season approaches, it’s important to be aware of the potential for tax-related identity theft and scams. Unfortunately, these types of crimes are all too common, with scammers using various methods to steal personal information and commit fraud.  …

Avast Threat Labs Q4 2022 Threat Report | Avast

The Avast Threat Labs Q4 2022 Threat Report observed a rise in social engineering attacks during the final quarter of 2022, including invoice and refund fraud, tech support scams, and others aimed at stealing money. Cybercriminals continued to engage in…

10 Tips for Securely Filing Taxes Online | Avast

Filing your taxes online can be a convenient and efficient way to get them done, but it’s important to be aware of the potential risks. For example, online filing potentially opens your personal information up to exposure in a data…

Online Dating Safety Tips | Avast

With Valentine’s Day looming on the calendar like a pulsing red heart, the online dating world is sure to experience a flutter of activity. But it’s not just lonely hearts who are flocking to the dating sites – unfortunately, predators…

W-2 phishing scams: Everything you need to know

It’s that time of year again – tax season – and, unfortunately, it’s also a peak time for phishing scams. Cybercriminals know that people are more likely to be filing their taxes and sharing sensitive information online, so they increase…

ChatGPT: Is its use of people’s data even legal?

In the world of AI and machine learning, the sudden massive popularity of language learning models is a hot topic. These tools — the current most popular of which is probably ChatGPT-3 — are language models that can answer specific…

W-2 phishing scams: Everything you need to know

It’s that time of year again – tax season – and, unfortunately, it’s also a peak time for phishing scams. Cybercriminals know that people are more likely to be filing their taxes and sharing sensitive information online, so they increase…

ChatGPT: Is its use of people’s data even legal?

In the world of AI and machine learning, the sudden massive popularity of language learning models is a hot topic. These tools — the current most popular of which is probably ChatGPT-3 — are language models that can answer specific…

AI in cybersecurity: The good, the bad, and the ugly

Artificial intelligence (AI) is rapidly becoming a powerful tool in the cybersecurity landscape, with the potential to revolutionize the way we detect and respond to cyber threats. However, as with any technology, there are also risks associated with the use…

Cryptocurrencies: How have they influenced cybercrime?

Cryptocurrencies have now been around for over a decade. Since their inception, they’ve been gaining traction as a legitimate form of currency. However, along with the rise in popularity of cryptocurrencies, there has also been a rise in the use…

Malicious USB devices: What are the risks?

It’s understandable that when people find a misplaced USB drive or memory stick, they want to find out what it contains. Human curiosity is what attackers exploit, after all. However, plugging an unauthenticated device into your own or work computer…

Cryptocurrencies: How have they influenced cybercrime?

Cryptocurrencies have now been around for over a decade. Since their inception, they’ve been gaining traction as a legitimate form of currency. However, along with the rise in popularity of cryptocurrencies, there has also been a rise in the use…

The dark web in 2023: What’s on it?

When it comes to the internet, most of us only scratch the surface. The vast majority of what we know and use on a daily basis is the “surface web,” which includes all the sites that can be easily accessed…

DDosia: A botnet created to facilitate DDoS attacks

The DDosia project is a successor of the Bobik botnet linked to the pro-Russian hacker group called NoName(057)16, as revealed in a recent analysis by Avast researcher Martin Chlumecky. The group targets DDoS attacks on private and public organizations in…

Smishing: The new year is here — and so are new scams

Smishing has become an increasingly popular attack method among cybercriminals – and they’re getting better at using it.  This article has been indexed from blog.avast.com EN Read the original article: Smishing: The new year is here — and so are…

Oura Ring: The privacy-protecting fitness tracker

‘Tis the season, everyone! As the year wraps up, many of us are likely thinking about New Year’s resolutions. And what’s on the top of everyone’s list, basically every year? Fitness! Yeah, I know, I know; this is the year…

Reading list: Infosec books for 2023

If you’re looking for recommendations for infosec books to give to a colleague – or even to catch up on some holiday reading of your own – here’s a suggestion: Take a closer look at the oeuvre of Bruce Schneier,…

Apple Watch: What does yours know about you?

Apple Watch was kind of a joke when it launched. Wearable tech didn’t have a great reputation at the time (remember the debacle that was Google Glass?), and Apple Watch was viewed by many as one more non-essential tech toy…

An update on international data privacy protection

The 38 member countries of the Organization for Economic Cooperation and Development (OECD) have recently adopted a new international agreement regulating government access to its citizens’ private data. The OECD draws on its membership from countries on several continents, including…

Ring doorbell: Here’s what it knows about you

New gadgets make excellent holiday gifts. They’re useful, oftentimes a little more expensive than most people are willing to pay on their own, and can be a lot of fun! But, unfortunately, many of this year’s hottest tech gadgets also…

Merry Patching Christmas

For those of you that are on your way to take a break next week, we’ve got a bit of advice to avoid encountering some unnecessary scares during this time that you’ll be spending with your loved ones. This article…

DoD supply chain lessons learned

A July 2022 survey of 300 U.S. Department of Defense (DoD) IT contractors shows a woeful lack of information security in the majority of situations. These contractors are part of the DoD’s supply chain that, in typical government speak, is…

This year’s hottest tech: Related privacy concerns

The holiday season is upon us, and many of us are looking forward to soon unwrapping the latest and greatest tech gadgets. From smartphones and smart speakers to fitness trackers and home security cameras, there are plenty of exciting new…

Phishing scams: The easy way to protect yourself

Phishing scams are on the rise, with millions of people falling victim to these online scams every year. In fact, according to the FBI’s Internet Crime Complaint Center, phishing scams accounted for more than half of all reported cybercrime incidents…

International police operation takes down iSpoof

Last week, an international group of law enforcement agencies took down one of the biggest criminal operators of a spoofing–as-a-service enterprise. Called iSpoof, it collected more than $120M from victims across Europe, Australia, Ukraine, Canada, and the United States. During…

AVAR 2022 kicks off in Singapore

Here’s an exciting piece of news: This week, the Association of Anti-Virus Asia Researchers (AVAR) is celebrating their 25th annual security conference in Singapore.  This article has been indexed from blog.avast.com EN Read the original article: AVAR 2022 kicks off…

Book review: How has social media rewired our minds?

With the reinstatement of previously banned Twitter luminaries including Donald Trump and Kathy Griffin, now’s the perfect time to do further research into the role of social media in our public discourse.  This article has been indexed from blog.avast.com EN…

Someone is spying on you

When we hear the word “spy,” we usually think of Cold War era, cloak-and-dagger spies. But in the digital age when we say someone is “spying” on you, we’re talking about online. And someone is almost certainly spying on you.…

How to be a savvy online shopper this holiday season

With the holiday shopping season starting earlier and earlier, you’ve probably already jumped into the world of holiday online shopping this year. But as your text messages, emails, and social media advertisements fill up with “killer deals,” we want to…

Using AI as an offensive cyber weapon

AI is a double-edged sword. It has enabled the creation of software tools that have helped to automate tasks such as prediction, information retrieval, and media synthesis, which have been used to improve various cyber defensive measures. However, AI has…

How to be a savvy online shopper this holiday season

With the holiday shopping season starting earlier and earlier, you’ve probably already jumped into the world of holiday online shopping this year. But as your text messages, emails, and social media advertisements fill up with “killer deals,” we want to…

Using AI as an offensive cyber weapon

AI is a double-edged sword. It has enabled the creation of software tools that have helped to automate tasks such as prediction, information retrieval, and media synthesis, which have been used to improve various cyber defensive measures. However, AI has…

Improve user security with UX design using these tips

Neglecting user security puts users at risk financially, professionally and even sometimes physically. When it comes to user experience, we can safely say that it has become very important to think about user security when designing digital products.  This article…

New phishing campaign posing as Spain’s Tax Agency

There’s a brand new phishing campaign on the run in Spain that poses as the Spanish Tax Agency, Agencia Tributaria.  This article has been indexed from blog.avast.com EN Read the original article: New phishing campaign posing as Spain’s Tax Agency

Twitter Blue means bad things for the platform’s security

Shortly after acquiring Twitter, Elon Musk announced that Twitter will be launching an $8 monthly subscription that gives users the ability of actually buying a verified Twitter account, otherwise known as Twitter Blue. Currently, this functionality is available in the…

World Cup 2022: Watch out for scams

In less than two weeks, the largest sporting event in the world will begin: The FIFA World Cup 2022. According to official data, the last time it took place (in Russia during 2018), the tournament was followed by nearly 3.6…

MFA recommendations from CISA

The US Cybersecurity and Infrastructure Security Agency (CISA) has recently published a fact sheet on implementing phishing-resistant multi-factor authentication (MFA). The publication is in response to a growing number of cyberattacks that leverage poor MFA methods. “Not all forms of…

How to stay safe when using public Wi-Fi hotspots

Many of the Wi-Fi hotspots you use in your hometown and when you travel have major security flaws that make it easy for hackers to see your browsing activity, searches, passwords, videos, emails, and other personal information. It’s a public…