Protecting over 200 million PCs, Macs, & Mobiles – more than any other antivirus

Archive

Archive for the ‘General’ Category
June 26th, 2014

12 angry minions

avast! GrimeFighter is one of the most popular new products among AVAST users.

However, many of you still don’t know the benefits of it or what avast! GrimeFighter does. Therefore we have prepared a series of articles with a “movie theme” to show you the functionality of our Grime-fighting minions! The first one, Learn everything you always wanted to know about avast! GrimeFighter, but were afraid to ask!, gave you an overview of product functionality. Now let’s dig a bit deeper into the subject.

12 Angry minions.

The Grime Fighter crew work together towards one goal: Cleaning and optimizing your PCs performance. They have no mercy for temporary and unwanted files and apps, including ‘bloatware’ and ‘crapware’. This is a very complicated task, therefore our 12 Angry minions analyze each element in depth before deleting anything that is actually important to you. This influences the time of the cleaning process (it takes up to 4 hours depending on the initial state of your PC), but also ensures results: A more efficient and faster machine. Although our minions make it look easy and entertaining, cleaning Grime so thoroughly is a complex task!
avast! GrimeFighter optimizes your PC better than other products.

For the same reason each minion has it’s specialization and focus on different tasks:

OFFICER PETE is head of the GrimeFighter team.

KOBAYASHI sneaks up on malware to eliminate it from your PC.

NIKITA specializes in cleaning and maintaining your web browser.

DALE JUMPSHOT JR. focuses on removing crapware and bloatware to speed up Windows load time.

BEEF strengthens the security of your applications.

TORQUE tuns up and optimizes Windows services and settings.

SIR JEFFREY investigates and analyzes your PC hardware components.

MARIO analyzes your network connection for security and speed.

DR. LIZA analyzes and classifies all of the stuff on your hard drive.

ZILCH takes out the trash on your PC to free up your drive space.

MAXIMUS analyzes and researches the newest hacking trends the instant they emerge, and  last but not least HOLMES focuses on your privacy settings.

The avast! Minions perform deep analysis, by booting your PC into Linux to identify Grime and clean every corner of your PC. Some forms of Grime are hard to remove when Windows is running, but can’t hide when we sedate your computer. Unwanted files and apps go by many names, including ‘bloatware’, ‘crapware’, and sometimes even half-jokingly using the name ‘virus.’ We define all of these as ‘Grime.’ The image below visualize Minions in action. 

Minions in actions

 

To summarize: Computer users can download avast! GrimeFighter’s scan tool to have their PC examined for free. It finds anything that slows the PC. If users then want to clean their PCs, they may buy their own GrimeFighter license, to purge Grime from the PC. GrimeFighter’s minions do all the maintenance work… while you surf the web or sip a cup a tea. For more information, please visit our website.

Thank you for using avast! Antivirus and recommending us to your friends and family. For all the latest news, fun and contest information, please follow us on FacebookTwitter and Google+. Business owners – check out our business products.

June 25th, 2014

FNATIC talks to Avast about DDoS attacks targeting E-Sports

At the beginning of 2014, gaming platforms such as League of Legends and other video-game servers were brought down by distributed denial-of-service (DDoS) attacks. These attacks cost professional gamers thousands in advertising revenue. FNATIC Senior Features writer, Davor ‘Dendra’ Miljkovic, spoke to Jiri Sejtko, the Director of the AVAST Virus Lab, about how to handle DDoS attacks. Here is a reprint of the original article that appeared on the FNATIC website.

 avast! protects over 219 million active devices on all inhabited planets

avast! protects over 219 million active devices on all inhabited planets

The threat is real

The internet realm is becoming increasingly troublesome, as the encyclopedia of viruses, worms, trojans and other malicious creations only keeps growing. However, when it comes to gamers it seems that one particular annoyance tops that list nowadays – Distributed Denial-of-Service (DDoS) attacks. Whether it’s a TS server lagging for no apparent reason or an entire gaming server overloading, chances are you’ve experienced a DDoS attack before.

Dating back to 2000, DDoS attacks have been used to make a machine or network resource unavailable to its intended users and there are several methods to accomplish this. One of the more popular methods is to flood a targeted system with incoming traffic to the point it cannot respond to legitimate traffic or only respond very slowly. This very method is the premium choice among disgruntled gamers who aim to sabotage a server or one particular system of another gamer they dislike for whatever reason.

So what can you do if you find yourself targeted by one such disgruntled gamer?

What can be done?

To see what can be done to help you deal with a DDoS attack or a potential one, we spoke to Jiri Sejtko, the Director of Viruslab Operations at Avast Software:

Q: What kind of security measures are available to protect yourself from a DDoS attack?

A: Basically, there is no protection if an attack is well done, however you can always do some steps to defend your system once the attack has happened.When you know how the attack is done, it’s possible to tweak (setup) your system and to try to find out where the attack came from.

Q: Can you elaborate on these steps?

A: One of the steps would be to configure your router to filter IPs or even protocols used in the attack – this step will help if the attacker didn’t use the whole bandwith of the given Internet connection. Best ask your Internet Service Provider to do this for you.

Q: So which ISPs would you recommend?

Read this answer and the entire article on the FNATIC website.

 

avast! Internet Security is the official antivirus software of the FNATIC team

avast! Internet Security is the official antivirus software of the FNATIC team

 

avast! Internet Security is the official antivirus software of the FNATIC team. avast! offers a massive 40% discount to FNATIC fans! Purchase your discounted avast! Internet Security from the dedicated FNATIC page at avast.com.

Thank you for using avast! Antivirus and recommending us to your friends and family. For all the latest news, fun and contest information, please follow us on FacebookTwitter and Google+. Business owners – check out our business products.

June 16th, 2014

INFOGRAPHIC: Ole Ola! America will play World Cup soccer on mobile devices

The U.S. is on the soccer field: Our own triple-threat celebrity, Jennifer Lopez, performed at the opening ceremony; Facebook set up a special “Trending World Cup” news feed; Twitter predicts the most tweeted global event ever; Google search features a daily soccer doodle; and the U.S. is playing its first game in the tournament today.

The 2014 World Cup is more digital than any other soccer World Cup. At AVAST, we wanted to understand how people will watch and participate in the tournament this year. In a survey of more than 3,000 AVAST users in the U.S., we discovered mobile devices will play a big part: Two out of three American soccer fans will use their smartphone or tablet to enhance their World Cup experience. 

World Cup 2014, USA, soccer, mobile

Soccer news, live scores and vuvuzela sounds on smartphone

Highest priority for Americans is to stay on top of the game results with more than half the fans reporting they will check the live scores from their smartphone. One-third said they will read news about the games on their smartphone or tablet and one-fifth will live stream the games on their mobile device. Many will certainly be interested in the results as they placed a bet. The best strategies to bet on the winning team have been discussed and people are already well into betting fever. One out of ten survey respondents will use or have already used their smartphone or tablet to place bets. 

There is even more that can be done on mobile. For six percent of respondents, collecting and trading stickers of the players has moved from the paper booklet to digital albums in the cloud. And what would a World Cup be without the famous BZZZZ vuvuzela sound? Cover your ears – this year you can expect to hear a cacophony of digital horns: One in 20 intend to use a mobile app to sound the vuvuzela.

Instead of just following the games, every eighth American fan wants to become a world champion themselves – and will play soccer games on their mobile device. 

For all mobile activities, nearly half of Americans stick to the official FIFA apps, the majority mixes official with unofficial apps or only go for unofficial apps. It’s great for fans to have a wider variety of apps to choose from, but beware, we found some gaming apps that are fake, they won’t let you play and instead just want to collect your data and show you ads.

One out of five will live stream the games on smartphone or tablet

The majority of Americans will still watch the games the traditional way – eight out of ten – on the TV at home. However, digital sources are slowly taking over:  40 percent will watch the tournament on PC  and on the smartphone and tablet 21 percent will watch. 

Now who do Americans think will win? 

Americans’ faith in their own team is low!  Only eight percent think the U.S. team will win. Instead, all bets are on the World Cup host: One-third of Americans pick Brazil to take home the cup.

World Cup safety tips

At AVAST, we think we can all be winners if this will be a safe World Cup. Using your smartphone and tablet during and after the soccer World Cup, make sure you are protected:

  • Only download apps from the official Google Play store
  • Choose apps from official sources and read what others are saying about them
  • Take a close look at the permissions an app requests and question if they are necessary for the apps’ functionality   
  • Use antivirus on your PC, smartphone, and tablet
  • If live streaming the games on public Wi-Fi, make sure you are protected with a VPN solution encrypting your communications such as avast! SecureLine

 

World Cup 2014, mobile, USA, soccer

June 13th, 2014

Everything you always wanted to know about avast! GrimeFighter, but were afraid to ask!

In April 2014, we introduced avast! GrimeFighter in 14 languages, offering our product to millions of users. Ever since then, avast! GrimeFighter became one of the most popular new products among our users. However, many of you still don’t know the benefits of it or what avast! GrimeFighter does. Therefore we have prepared a series of articles to show you the functionality of our grime-fighting minions! Learn everything you always wanted to know about avast! GrimeFighter, but were afraid to ask!

1. Who are the minions?

They might look like funny characters from an animated movie. The minions, however, are serious warriors against all kind of dirt that accumulates on your computer over time. Removing “Grime” is quite a sophisticated process, and it must be done properly. Our minions must be very careful not to remove unnecessary items, as well as look through the entire system so as not to miss something.  Each of the characters play an important role in the cleaning process, to achieve one common goal: Speed up your PC and optimize it’s performance.  Meet the “mean and lean” GrimeFighter crew:

Grime crew1

Grime crew Read more…

June 10th, 2014

Keep your phone safe from hackers and thieves while on vacation

Traveling to Brazil for the 2014 FIFA World Cup, or just headed out to your local beach for a daytrip? You remember to pack your sunglasses, a hat, and plenty of sunblock, but don’t forget that your mobile gadgets need protection too.

world-cup-hackers Here’s a couple more items for your packing list:

  • avast! SecureLine VPN to protect against dodgy public WiFi
  • avast! Mobile Security and Anti-Theft to protect against thieves

That free WiFi HotSpot could get you in hot water!

Spectators at the 2014 FIFA World Cup Brazil will have lots of choices of free WiFi. At least 6 of the 12 World Cup stadiums have access to free WiFi built in, and planners have created WiFi hotspots across 2,300 access points, including parks, squares, and public transit stations. Fans not watching in person will check scores on their phone or watch live streaming matches by connecting to free WiFi at hotels and bars.

“A WiFi attack on an open network can take less than 2 seconds,” tweeted @ExtremeNetworks recently. Cybercrooks can access and steal your personal data when you connect to these unprotected networks. Having your identity stolen and bank account emptied out while on vacation could ruin any trip – even one to paradise!

“Hackers target public hotspots, where it’s easy to follow every move that users of the WiFi connection make, allowing them to access emails, passwords, documents, and browsing behavior,” said Vincent Steckler, Chief Executive Officer of AVAST Software.

Use a VPN service to make sure that doesn’t happen. avast! SecureLine VPN protects your privacy by making your logins, emails, instant messages, and credit card details invisible to spying.

Read more…

Comments off
June 4th, 2014

How to protect yourself from the coming virus apocalypse

After the takedown of a major botnet, users have a “two-week window” to protect themselves against a powerful computer attack that ransoms people’s data and steals millions of dollars from unsuspecting victims. 

Zeus_Banner_blhd01
If you read our blog, you are familiar with the dangers of the Zeus Trojan and ransomware, and how people get infected. Here’s a quick review:

1. The victim opens a carefully crafted email which is designed to look like it came from their bank or a well-known company.
2. The victim clicks on and runs an email attachment.
3. Malicious software like the one making the news now, Gameover Zeus, releases a Trojan which searches the computer for passwords and financial data.
4. Once Gameover Zeus finds what it’s seeking, cybercrooks instruct CryptoLocker, ransomware software, to hijack the computer, encrypt the files, and demand payment for it to be unlocked. To get access to your computer again, you must pay a ransom within a set amount of time.
5. Once infected, the computer becomes part of the global botnet.

The good news

Led by the FBI, agents from Europol and the UK’s National Crime Agency (NCA) brought two computer networks that used the Gameover Zeus botnet and Cryptolocker ransomware to infect up to a million computers and cost people more than $100 million under control of the good guys.

The bad news

As we explained in our blog post yesterday, GameOver Zeus May not be as Over as You Think, cybercrooks could conceivably build another botnet to replace the ones that were shut down.

Why the two-week window?

This window is based on the amount of time the FBI thinks they can ”hold the upper-ground against the cybercriminals.” Two weeks should be enough time for computer users to update their operating system software and security software and disconnect infected computers.

Steps to take now to protect your computer

Read more…

Comments off
June 3rd, 2014

GameOver Zeus May not be as Over as You Think

The FBI, along with the Department of Justice, announced a multinational effort on their website that has disrupted a botnet called GameOver Zeus. GameOver Zeus has infected millions of Internet users around the world and has stolen millions of dollars.

AVAST detects and protects its users from CryptoLocker and GOZeus.

Everyone should have up-to-date antivirus protection on their computer. AVAST detects and protects its users from CryptoLocker and GOZeus.

 

The UK’s National Crime Agency (NCA) has worked closely with the FBI to crack down on the GameOver Zeus botnet. The NCA has given infected users a two week window to get rid of the malware and those lucky enough to have thus far been spared, the opportunity to safeguard themselves against future attacks. The two week window is an estimation on how long it will take cybercriminals to build a new botnet. The FBI has stated on their website that GameOver’s botnet is different from earlier Zeus variants in that the command and control infrastructure communicates peer-to-peer, rather than from centralized servers. This means that any infected computer can communicate controls to other infected devices. If cybercriminals build a new botnet, which will likely happen, the new botnet can resurrect dormant infected machines and continue to infect new users while stealing financial and personal information from innocent victims.

Do you really have two weeks, and what should you do?

Who knows how long it may take for a new botnet to emerge; it could appear tomorrow or in two weeks. People should not take this threat lightly and should act immediately. Read more…

June 3rd, 2014

New avast! Account with Facebook Security is here. Join Beta testing

Security and privacy on Social Media is a big topic at AVAST. While our antivirus products protect your various devices from malware infection spread on social channels, your privacy is still exposed to the public.

Not anymore!

It’s been a while, since we acquired Secure. me and it’s a superb product. Our team worked hard to integrate the privacy solution into our security portfolio. Now we are proud to introduce the result: Beta version of the avast! Facebook Security.

We are very excited to hear your feedback on the product. Experienced users are most welcome to participate in the Beta Testing. We await your feedback on the product features, user interface, bug reporting, your general experience, as well as your suggestions for the final name of the product. Moreover avast! Facebook Security is a part of the new avast! Account look and  your feedback on it is more than appreciated.

To make your life easier, we will guide you through all the steps, starting from:

How to participate in beta testing?

1. Log in our new version of the AVAST account.

Facebook Security

Read more…

June 1st, 2014

Kids use their parent’s smartphones, not to call grandma, but to visit sites with adult content

Have you ever been on a long road trip with your children? Then you will agree: It’s great to have something to entertain your children, to distract them from the boring drive. Today smartphones and tablets are a great source to keeping kids occupied for long periods of time, not only on the road. AVAST has found out that four out of five parents share their mobile devices with their kids. This is the result of a survey AVAST conducted amongst 1,500 parents in celebration of today’s International Children’s Day. Children are very tech-savvy and technology can be a great teaching tool, if kids use it appropriately. However, our survey results show that kids don’t always choose the most kid friendly apps and activities while using their parents’ devices.

11 to 15 year olds seem to be the most curious – and most at risk

Many kids do mischievous things once they get their hands on their parents’ devices, however our survey has shown that 11 to 15 year olds are most likely to use smartphones and tablets for risky activities. It’s not surprising that anything inappropriate is interesting to kids; 32% of parents admitted that their child has accessed adult content using their mobile device. More than half of these kids were between the ages of 11 and 15 years old. The risk here is not only the child getting in contact with adult content, but the whole device and other family members are at risk as well: Mobile sites and ads including adult content often lead to phishing sites or sites including malware that is downloaded with the tap of a finger.

Sending messages in their parents’ name, behind their parents’ backs also seems to be a fun thing for kids to do, with 19% of parents claiming their child has hit the send button. Again, the sneakiest age group is 11 to 15 years old, 45% of messages were sent by them. If children send text or social media messages in their parents’ name, this can lead to embarrassing situations – or cause real damage, e.g. if a child sends an email from their parents’ business email address. 

In addition to this, 7% of kids accessed apps that contained banking or credit card information and 6% used their parents’ device to make purchases without their parents’ knowledge. Once again the age group 11 to 15 years was the one caught red-handed the most – 44% of the 7% of kids that accessed apps containing banking and credit card information and 52% of the 6% of kids that made purchases were 11 to 15 years old.

Many children and teenagers have their own devices

AVAST asked the 20% of parents who don’t share their devices with their kids, why they choose not to do so. Of these, 38% said their kids have their own devices, 40% think their kids are too young (between the ages of 0 to 10 years old), and 22% don’t trust their kids. Out of the 22% that said they don’t trust their kids with their devices, 11 to 15 years old was the most mistrusted age group. Despite this, of the 38% parents that said their kids have their own devices, 48% are between the ages of 11 and 15. Based on what parents caught their 11 to 15 years doing with their mobile devices, can you imagine what these kids may be doing if they have their own device?

Safety tips for kids using mobile devices

Be aware of the sites your children are visiting. The Internet contains everything from cute cats to adult films – do you know which your kids are accessing? Talk to your kids, let them know that not everything online is necessarily safe and keep an eye on what they’re doing online. Also, often apps and ads with adult content can link to malicious sites– so make sure your device is safe. Install an antivirus app like avast! Mobile Security on your phone to protect you and your family.

Lock apps that can make purchases. Any apps containing banking information or that have credit card information saved to make purchases should be password protected, whether your child has their own mobile device or borrows yours. App stores such as Google Play and iTunes make it easy to purchase apps, all you have to do is type in your account password. Even if you don’t think your child knows the password, make sure you add a second layer of protection by password-locking certain apps.

Talk to them about messaging apps. In one of our recent blog posts we discussed the importance of talking to your kids about cybersecurity, especially when it comes to messaging apps and social media. Whether they are borrowing your phone or using their own device, talk to your kids about what information they should share, who they should talk to online and how they should be talking to others.

Talk to them about the value of money. Kids may not realize that the things they order or download online cost actual money. The fact that they can’t visualize online transactions makes it seem like the things they are ordering online must be free! Come up with an agreement, either allow your kids to make purchases online if they consult with you first, or if in the instances of apps, they are free. You could even give your kids app store gift cards as their allowance.

Infographic: Here's what kids are doing with your smartphone

May 30th, 2014

Dear Download Scammers… GAME OVER

shutterstock_107284424I get asked this question pretty often: “Soooo IF you do not spend any money on advertising, or on retail presence, and nothing on pre-installations and OEMs, then how do you get new users?

Well, most often thanks to word-of-mouth. It goes something like this:

Step 1: The need

A PC user with an expiring or troublesome antivirus figures out he has a need for new security. (This does not happen to Mac users because of course they DO know Macs don’t need any AV…  ;)

Step 2: The call

A PC user calls his favorite geek or IT friend who knows EVERYTHING about computers. Yes, a PC user could also make the effort and learn about it himself, read some reviews, check some comparative tests, and so on, but that takes too much time.

Step 3: The advice

“get avast free antivirus …” OR “download avast free” OR “install avast home version”. Then your friendly geek hangs up because his time is valuable.

Step 4: The what?

The PC user is not really sure what it was he needs to do or where to go or how to spell it, but for this we have Google. So, he googles it out. Voila! Easy!

Step 5: Download

Google lists out the search results, the PC user goes to any of the top links, clicks-through to AVAST page and downloads avast! Free Antivirus. Some 15 million people do this every month, and right after they would choose install>accept>next>next>finish>thank you. Read more…

Categories: General, Marketing Tags: ,