Protecting over 200 million PCs, Macs, & Mobiles – more than any other antivirus

Search Results

Keyword: ‘settings’
May 26th, 2014

Your child on Facebook: learn about the privacy settings

Security matters to everyone, however security of our children is our top priority. We make sure that they are safe at school, home, and on the streets. Equally we need to provide them with a safe experience in the cyberworld. Recently, we published a blog about general online security of the children, which suggested that you take time and help your child with privacy settings on Facebook. Don’t worry, if you have no clue where to start, we will guide you through the labyrinth of sophisticated security and privacy settings settings. Follow our tips to secure yourself and your child on the most popular social network.

Privacy settings

Like other Internet giants, Facebook has been especially vulnerable to criticisms about privacy. In particular, critics have complained that even if you deactivate your account, the information can still remain on the network and be subject to web searches.~ comments Mashable in the article on recent Facebook privacy update

Following users’ complaints regarding privacy issues, Facebook decided to change the default settings of your status updates to be the visible for Friends only instead of Public. This however applies to Facebook newbies only! So if you and your children are already users, you still have a job to do! :)
Security shortcut

Facebook regularly updates its settings and as a result your profile settings can be restored to the default. In terms of  privacy it means: Everything is PUBLIC. Therefore it’s extremely important to review your profile regularly . You will not be able to influence everything, however there are an advanced number of settings that can be fully controlled by you. The three basic areas that you should focus on are:

  1. 1. Who can see your posts and images?
  2. 2. Who can contact you?
  3. 3. How you can help your child block harassing Facebook friends.

You will find this setting in the right top corner on the blue bar, in the Privacy Shortcuts section. Click on the See More Settings to open the window below and follow our suggestions.

Advacne privacz settings Read more…

July 21st, 2014

avast! is nominated the best antivirus for Windows by Lifehacker

avast! Free Antivirus was nominated by Lifehacker users as one of the best desktop applications.

avast! Free Antivirus

Lifehacker is a well-known site for its “Tips, tricks, and downloads for getting things done.” When the subject is to get protected and install an antivirus, they picked up avast! Free Antivirus and, now, last Sunday, avast! was picked again as one of the Top 5.

“It’s our pick as the best…it’s fast, lightweight,…”, says Lifehacker.

When expert people say something is the best, it is always due to a combination of factors and it varies (a lot!) among users. Lifehacker asked their users to point out where avast! excels and what they miss in the competition. They say they are confident of choosing avast! due to a lot of points.

Users  commented on the high level of usability and that it fits for common users, but doesn’t lack advanced settings for the geeky ones. If you want it, avast! has a high level of customization, fitting well for all needs, from gamers to your grandma!

“A fairly simple interface from which you can scan your computer, see statistics, update definitions, and more.”

Voters appreciate avast’s many features: Scans files, email, URLs, P2P programs, and more for malware. Automatic updates happen as soon as the virus database or program changes. In fact, the streaming updates are released each 4 minutes!

“It updates quietly in the background without fuss.”

“A plethora of on-access scanning and protection tools,” (some of which you may not want, but can be easily managed during the installation process.)

Silent mode where you can disable any and all notifications and warnings to keep performance slim and trim.”

“Others highlighted specific features, like avast!’s screensaver scan, where the application only kicks in when you’re away from the computer or the system is idle.”

Low system impact is a major consideration when choosing antivirus protection:

“avast! may be simpler and lighter weight than most other programs out there”

“The app itself is relatively resource light — you may not even notice it’s there”.

A few users highlighted the fact that avast! is cross-platform, and available for multiple operating systems.

LifeHacker says, “We personally don’t think paid antivirus are necessary in a home setting, especially if you use good browsing habits.”

And the #1 reason people choose avast! Free Antivirus?

“Best of all, it’s completely free.”

What are you waiting for? Install these avast! security products on your devices.

Thank you for using avast! Antivirus and recommending us to your friends and family. For all the latest news, fun and contest information, please follow us on Facebook, Twitter, Google+ and Instagram. Business owners – check out our business products.

July 11th, 2014

Six ways to secure your smartphone

AR AMSpost-enI bet you would be lost without your smartphone. It’s your lifeline to contacts, emails, and personal information, not to mention all those apps that you use for fun, entertainment, and business. You probably have bought something using your phone, so your credit card information is there, as well as your account log ins. In other words, it would be disastrous to lose it to a thief or be infected with a data-stealing app.

Keep reading for some solid tips that will help you secure your Android smartphones and tablets.

1. Install security software

Protect your smartphone or tablet from malicious attacks. Malware targeted at Android devices is increasing daily, and we project that it will be at PC levels in the next 4 years. Avast! Mobile Security stops malware, plus it help you locate your device if it is lost or stolen with avast! Anti-theft.   Install avast! Mobile Security and Anti-theft from the Google Play store, https://play.google.com/store/apps/details?id=com.avast.android.mobilesecurity

2. Use trusted stores to install apps

The major app stores like Google Play and Amazon are the safest places to go for apps. These have strict vetting procedures, so they are reliable sources most of the time. The ones you need to watch out for are the unregulated third party app stores, often originating from Asia or the Middle East.

For an extra safeguard on your Android device, disable the installation of apps from unknown sources by going to Settings>Security and unchecking the “Unknown Sources” option. Also check the “Verify Apps” option to block or warn you before installing apps that may cause harm.

3. Use a PIN or password and lock your apps

Your Android phone has its own security settings, so we recommend that you set a PIN number with a strong number code to lock the screen. To set your PIN or a pattern, go to Settings>Lock screen.

Read more…

July 9th, 2014

Android Forensics, Part 1: How we recovered (supposedly) erased data

Introduction to Android forensics (aka CSI: Android)

Digital forensics is a branch of science which deals with the recovery and investigation of materials found in digital devices. Forensics is usually mentioned in connection with crime, vaguely similar to criminal investigations on TV shows like CSI: Crime Scene Investigation and NCIS. However, several experiments (1, 2), including this one, use methods of digital forensics as proof that people do not pay attention to what happens with their personal data when replacing their digital devices (computers, hard drives, cell phones). In this blog post series we will reveal what we managed to dig out from supposedly erased devices. The sensitive information includes pictures (even very private ones!), videos, contacts, SMS messages, Facebook chat logs, Google searches, GPS location coordinates, and more.

What happens to the file when it is “deleted”

When people want to delete a file, most will use the standard features that come with their operating system. After it’s done, they consider the unwanted data to be gone forever. However, this is not true. When a file is deleted, the operating system merely deletes the corresponding pointers in the file table and marks the space occupied by the file as free. The reality is that the file is not deleted and the data it contained still remains on the drive. With regular usage of the drive, the remaining data will sooner or later be overwritten with different data. The same thing happens on your PC.

The following screenshots show the scenario. We used the program FTK Imager to mount the image of a partition containing user data. The first figure shows a [root] directory followed by [unallocated space]. Although all the sensitive files were deleted in the regular way, something still remained in unallocated space. In this particular example, we managed to dump 251 blocks of unallocated data and to recover interesting messages, for example from a Facebook chat. The seller of this HTC Sensation cell phone thought that his personal was cleared out, but the figures below show that he/she was tragically mistaken.

ftk_imager Read more…

July 2nd, 2014

How to prevent unnecessary costs of AVAST SMS notifications when replacing your SIM card

avast! Anti-Theft is a separate program included in the avast! Free Mobile Security appYou can install it at the same time as avast! Mobile Security, or later, during a separate installation. Its unique capabilities help you recover your phone by controlling it remotely with SMS commands or via the Internet by logging in to your AVAST account. The app can also notify you that your SIM card was removed, in case the device was stolen. All that will help you to control and locate your lost or stolen smartphone. Since its release, we have received many messages from all around the world, proving that avast! Anti-Theft has helped many users find their missing devices. A dramatic story with happy end came to us from the Humayuns brothers. They were attacked at a Pakistani market. Their smartphone was stolen during the attack. Luckily they were able to catch the thief using avast! Anti-Theft. Stories from the open road have also come our way from motorbike AVAST fan DuckyBoy and truck driver Steven B., who used AVAST to track their missing smartphones lost on the roads of USAWe even received a detective-like story from sisters Katharina and Nicole. Nicole’s phone was stolen during the trip to Vietnam, AVAST notified her sister Katharina that her SIM card had been changed and provided her with the phone’s new number. Using this information the girls successfully tracked down the stolen device (with a little help from Vietnamese authorities). Last but not least avast! Anti-theft managed to locate a phone that was lost for a year and a half, it traveled a great distance within Africa before it was found!

DiedreD-user-testimonial

 

However, we have also spotted questions from users who were surprised by the “extra charges for the SMS notifications”. Some thought the charges came from AVAST. Let’s clarify this functionality and explain, why mobile operators can charge you for SMS notifications sent from the avast! Anti-theft app.

Why is it happening and how to prevent unexpected costs?

Read more…

June 26th, 2014

12 angry minions

avast! GrimeFighter is one of the most popular new products among AVAST users.

However, many of you still don’t know the benefits of it or what avast! GrimeFighter does. Therefore we have prepared a series of articles with a “movie theme” to show you the functionality of our Grime-fighting minions! The first one, Learn everything you always wanted to know about avast! GrimeFighter, but were afraid to ask!, gave you an overview of product functionality. Now let’s dig a bit deeper into the subject.

12 Angry minions.

The Grime Fighter crew work together towards one goal: Cleaning and optimizing your PCs performance. They have no mercy for temporary and unwanted files and apps, including ‘bloatware’ and ‘crapware’. This is a very complicated task, therefore our 12 Angry minions analyze each element in depth before deleting anything that is actually important to you. This influences the time of the cleaning process (it takes up to 4 hours depending on the initial state of your PC), but also ensures results: A more efficient and faster machine. Although our minions make it look easy and entertaining, cleaning Grime so thoroughly is a complex task!
avast! GrimeFighter optimizes your PC better than other products.

For the same reason each minion has it’s specialization and focus on different tasks:

OFFICER PETE is head of the GrimeFighter team.

KOBAYASHI sneaks up on malware to eliminate it from your PC.

NIKITA specializes in cleaning and maintaining your web browser.

DALE JUMPSHOT JR. focuses on removing crapware and bloatware to speed up Windows load time.

BEEF strengthens the security of your applications.

TORQUE tuns up and optimizes Windows services and settings.

SIR JEFFREY investigates and analyzes your PC hardware components.

MARIO analyzes your network connection for security and speed.

DR. LIZA analyzes and classifies all of the stuff on your hard drive.

ZILCH takes out the trash on your PC to free up your drive space.

MAXIMUS analyzes and researches the newest hacking trends the instant they emerge, and  last but not least HOLMES focuses on your privacy settings.

The avast! Minions perform deep analysis, by booting your PC into Linux to identify Grime and clean every corner of your PC. Some forms of Grime are hard to remove when Windows is running, but can’t hide when we sedate your computer. Unwanted files and apps go by many names, including ‘bloatware’, ‘crapware’, and sometimes even half-jokingly using the name ‘virus.’ We define all of these as ‘Grime.’ The image below visualize Minions in action. 

Minions in actions

 

To summarize: Computer users can download avast! GrimeFighter’s scan tool to have their PC examined for free. It finds anything that slows the PC. If users then want to clean their PCs, they may buy their own GrimeFighter license, to purge Grime from the PC. GrimeFighter’s minions do all the maintenance work… while you surf the web or sip a cup a tea. For more information, please visit our website.

Thank you for using avast! Antivirus and recommending us to your friends and family. For all the latest news, fun and contest information, please follow us on FacebookTwitter and Google+. Business owners – check out our business products.

June 4th, 2014

How to protect yourself from the coming virus apocalypse

After the takedown of a major botnet, users have a “two-week window” to protect themselves against a powerful computer attack that ransoms people’s data and steals millions of dollars from unsuspecting victims. 

Zeus_Banner_blhd01
If you read our blog, you are familiar with the dangers of the Zeus Trojan and ransomware, and how people get infected. Here’s a quick review:

1. The victim opens a carefully crafted email which is designed to look like it came from their bank or a well-known company.
2. The victim clicks on and runs an email attachment.
3. Malicious software like the one making the news now, Gameover Zeus, releases a Trojan which searches the computer for passwords and financial data.
4. Once Gameover Zeus finds what it’s seeking, cybercrooks instruct CryptoLocker, ransomware software, to hijack the computer, encrypt the files, and demand payment for it to be unlocked. To get access to your computer again, you must pay a ransom within a set amount of time.
5. Once infected, the computer becomes part of the global botnet.

The good news

Led by the FBI, agents from Europol and the UK’s National Crime Agency (NCA) brought two computer networks that used the Gameover Zeus botnet and Cryptolocker ransomware to infect up to a million computers and cost people more than $100 million under control of the good guys.

The bad news

As we explained in our blog post yesterday, GameOver Zeus May not be as Over as You Think, cybercrooks could conceivably build another botnet to replace the ones that were shut down.

Why the two-week window?

This window is based on the amount of time the FBI thinks they can ”hold the upper-ground against the cybercriminals.” Two weeks should be enough time for computer users to update their operating system software and security software and disconnect infected computers.

Steps to take now to protect your computer

Read more…

Comments off
June 3rd, 2014

New avast! Account with Facebook Security is here. Join Beta testing

Security and privacy on Social Media is a big topic at AVAST. While our antivirus products protect your various devices from malware infection spread on social channels, your privacy is still exposed to the public.

Not anymore!

It’s been a while, since we acquired Secure. me and it’s a superb product. Our team worked hard to integrate the privacy solution into our security portfolio. Now we are proud to introduce the result: Beta version of the avast! Facebook Security.

We are very excited to hear your feedback on the product. Experienced users are most welcome to participate in the Beta Testing. We await your feedback on the product features, user interface, bug reporting, your general experience, as well as your suggestions for the final name of the product. Moreover avast! Facebook Security is a part of the new avast! Account look and  your feedback on it is more than appreciated.

To make your life easier, we will guide you through all the steps, starting from:

How to participate in beta testing?

1. Log in our new version of the AVAST account.

Facebook Security

Read more…

May 27th, 2014

How to wipe the data from my lost smartphone

howto2_enQuestion of the week: My phone was lost and there is no way to recover it. Thank goodness I had the data backed up. How do I use avast! Mobile Security to wipe all my information off of it?

We’re sorry that you lost your phone. You are not alone. Over one hundred smartphones are lost or stolen every minute of every day, but unfortunately 34% of smartphone owners haven’t protected their phone like you did. Congratulations on taking the initiative to back-up your data! We found out that half of smartphone owners don’t back up their data, even though they are concerned about losing it. (This seems to be theme – same thing happens with changing passwords.)

Many smartphone owners do not have anti-theft installed

Half of smartphone owners don't backup their data

If there’s no way to recover the device, then you are wise to use avast! Mobile Security to remotely wipe your phone of all your personal data.

Thorough wipe

Avast! Mobile Security and Anti-Theft has remote features that allow you to take certain actions. Wiping the phone can be carried out by SMS command. This is useful in your case when you do not expect to get your phone back and you do not want a thief to access your personal data. Read about how you can set up remote control on your Android phone.

Thorough wipe allows avast! to permanently and irreversibly delete the content of any SD card when wiping the phone. Wiping smartphones using up to Android 2.1 is somewhat restricted as a factory reset of the phone is not possible. However, avast! will try to delete as much as possible, for example contacts, call logs, SMS/MMS, browser history and SD card content, but not emails or apps.

From Android 2.2 onwards, a full factory reset is possible so you have full wipe capabilities. However, please be aware that this will also delete avast! Anti-Theft, unless it was installed as a rooted application.

The thorough wipe will take up to ten minutes, and will physically and irrecoverably delete the actual contents of your SD card. It is your choice whether to select the maximum level of security by using the thorough wipe option.

Protect your data with avast! Anti-Theft

To do a full wipe, avast! Anti-Theft needs to be configured in the advanced settings as a device administrator, otherwise applications, emails etc. will not be deleted. Download and install avast! Mobile Security and Anti-Theft from the Google Play store.

Don’t forget to backup your data with avast! Mobile Backup. It saves your contacts, call logs, SMS history, photos, and other irreplaceable data to your AVAST Account (and, optionally, Google Drive) to ensure that your priceless data is never lost. Download avast! Mobile Backup for free from Google Play.

All SMS commands, along with a short description how everything works is explained in our manual (PDF). It’s short and easy to understand.

Thank you for using avast! Antivirus and recommending us to your friends and family. For all the latest news, fun and contest information, please follow us on FacebookTwitter and Google+. Business owners – check out our business products.

May 22nd, 2014

The Majority of Children Have Been Asked to Share Inappropriate Photos and Videos Online – Make Sure Your Child is Protected

Kids are online now more than ever with Internet access at home, school and on-the-go with mobile devices. The United Kingdom’s four largest Internet Service Providers have collectively launched Internet Matters, a non-profit organization that helps parents keep their kids safe online. According to Internet Matters, nine in ten kids under the age of ten go online and 26% of kids between the ages of ten and 13 are online for three or more hours a day.

parents, online safety, protection

Social Media 

Although there is an apparent shift in teens from Facebook to more private social networking apps, like Snapchat, it is still important to talk to your kids about privacy settings and their online reputation. Internet Matters claims that the average number of friends on social networking sites is 272 for kids between the ages of 12 and 15. Sit together with your kids and go through their privacy settings with them. This will help you get a better understanding of how social networks work and will provide you with the opportunity to talk openly about the importance of online privacy. Kids may not realize how harmful social networking sites can be to their reputation and that once something is published online it is difficult to permanently remove and can come back to haunt them.

shutterstock_144042481Cyberbullying and Strangers 

You teach your kids to be kind to others, to tell you or a teacher if a classmate is bullying them and to not talk to strangers – these same rules apply online. Internet Matters states that 60% of teens have been asked to share inappropriate images and videos of themselves. Bullies and sexual predators have an open invitation to your home thanks to the Internet. This makes it vital for you to talk to your kids about who they talk to and what topics they discuss online. Let them know they can come to you if someone bullies them or approaches them in an uncomfortable way, whether it be on social networking sites or in private chats. Make sure your kids only connect with and talk to people they know and trust in real life and never reveal personal information such as their address or inappropriate images under any circumstance.

How do your children go online? Do you use and share mobile devices in your family? Take our anonymous survey here