Most of you know avast! Antivirus as a free antivirus solution that provides comprehensive protection for consumers. With over 211 million users, including small companies up to enterprise using avast! Endpoint Protection, avast! is the most trusted antivirus protection in the world.
- AVAST has over 3,000 business partners worldwide and the number is growing!
- The avast! Endpoint Protection business line offers products to fit your needs and budget
- Light, easy-to-deploy and manage with the same award-winning antivirus designed for SMB needs!
- Our business products are easily manageable, so you and your clients don’t have to be IT experts to make your business secure!
The AVAST Partner Program
The AVAST Partner Program team has prepared rewarding programs for our business partners. New partners are welcomed with a special package to help them grow their business with AVAST immediately.
We have a great partner program for AVAST resellers, providing sales leads, project support as well technical support and training. Our aim is simple; provide best-in-class products with a best-in-class engagement model. We want to keep it simple, effective and fun ~ said Peter Baxter AVAST VP – WW Channels & Corporate Products. For more follow this link.
It‘s easy! Just fill in a partner application form, and we will take care of the rest. One of our team members will contact you within 2 business days and get you on your way to being an official AVAST business partner.
What are the next steps?
After the resellers agreement has been finalized, our sales representative will get in touch with you and agree on the next steps at your convenience. Shortly after the registration we will invite you for welcome training where you will learn more about our Endpoint Protection solutions and our business model. Read more…
More than one billion people nowadays use smartphones devices and this number is growing rapidly. With the growing numbers of mobile users accessing the internet on Android smartphones and tablets, and iOS iPhones and iPads, the number of mobile threats and attacks is rising progressively.
Mobile users store sensitive data, and engage in online banking operations, exposing devices to the modern mobile threads. You need constant protection. Not even these big names were immune from attack: German Chancellor Angela Merkel’s smartphone was hacked; Rovio, creator of popular game Angry Birds, reported that the personal data of its customers might have been accessed by U.S. and British spy agencies; and recent news of other leaky phone apps have caused people to look for ways to protect their private mobile communications.
Unprotected WiFi presents a real and present danger
Edward Snowden’s recently leaked documents revealed that the Canadian government’s intelligence agency, CSEC, collected data from travelers who connected to unprotected WiFi at Canadian airports. Read more…
Between February 24th-27th, visitors to AVAST booth – 5K29 in Hall 5 will learn how to stay safe from spying eyes and rampant security flaws including Apple’s recent exploit. We have prepared an interesting program, including live previews of all avast! SecureLine VPN and avast! Mobile Security features.
At the booth, the multi-lingual team will educate visitors about how AVAST’s various security products (for PC, Android, and iOS) can protect you from malicious programs regardless of origin or type, including malware from governments and official institutions. Products on display are:
avast! Secureline VPN
Visitors will learn how to use avast! Secureline VPN to anonymize public WiFi browsing. SecureLine is effective protection against hackers and spies accessing personal data and browsing activities as well as the threat of “man-in-the-middle-attacks” from the recent Apple SSL encryption bug.
avast! Mobile Security
The AVAST team will teach you how to use avast! Mobile Security to protect your Android devices from spies and hackers, avoid data loss, as well as defend against device theft, and malicious programs – including spy-agency malware that is whitelisted by others.
The team will also explain how avast! Anti-Theft works. You will learn how to view the location of a lost or stolen phone, activate an alarm, delete personal data to prevent unauthorized access, and even take photos of any thief and record their voice in order to recover a stolen device.
For the press
Journalists interested in speaking to an AVAST expert at the Mobile World Congress in Barcelona, can meet up with our Security Experts. To arrange a meeting, contact our PR manager Marina Ziegler via email at email@example.com or tweet her at @Marina_Z.
A major Apple security flaw allows cybercrooks and spies to grab personal information like email, credit card numbers, and other sensitive data. Apple confirmed researchers’ findings that the same SSL/TSL security flaw fixed with the latest iOS 7.0.2 update is also present in notebook and desktop machines running OS X.
Please apply the patches as advised in this post.
It is clear that we need constant protection to cover flaws that will always exist; flaws that we are not even aware of. Reuter‘s reported that
The bug has been present for months, according to researchers who tested earlier versions of Apple’s software. No one had publicly reported it before, which means that any knowledge of it was tightly held and that there is a chance it hadn’t been used.
But documents leaked by former U.S. intelligence contractor Edward Snowden showed agents boasting that they could break into any iPhone, and that hadn’t been public knowledge either.
It’s very public now, and that means the race is on between cybercrooks to exploit the flaw and Apple to fix it. You are exposed until the bugs are identified by the vendor, a patch is created, and it’s pushed out or you install it. Your vulnerability increases when you use public WiFi Hotspots.
Your best protection is constant protection
It’s precisely because we put ourselves at risk by using free WiFi, and we don’t know when the next security crisis is coming that we need constant protection. SecureLine VPN is that protection. Read more…
Apple iPhone, iPad, and iPod users: Update your mobile operating system iOS now to patch a serious SSL encryption bug that opens you wide to a “man-in-the-middle-attack,” (MITM) especially when you use unsecured WiFi, for example at a cafe, hotel, or airport, even at your home. The flaw is “as bad as you could imagine” says one cryptography expert.
What is protected and what’s not
The 7.0.6 update is for all devices that can run iOS 7; iPhone (4 and later), iPod touch (5th generation) and iPad (2nd generation).
The iOS 6.1.6 update is for the iPhone 3GS and fourth-generation iPod touch.
ATTENTION: The bug still exists in Apple’s Mac OS X 10.9.1 desktop operating system and there is no patch for it at this time.
- 1. Plug the device into your computer
- 2. Open iTunes
- 3. Click the device name
- 4. Click the button that says, “Check for update”
The best protection is VPN
This security flaw allows a cybercrook to use an insecure WiFi connection to put a man electronically “in the middle” of the transactions you make on your iPhone or iPad to intercept data.
“The flaw is in SSL, and the easiest way to exploit that is via unsecure/public WiFi,” said Ondřej Vlček, AVAST’s COO told Apple users in San Francisco before the annual RSA conference begins. “avast! SecureLine VPN for iOS can protect against the Apple security bug.”
The MITM attack gives them access to the information you thought was secure like credit card numbers. The best protection is to plug that hole with a VPN product.
How to get avast! SecureLine
avast! SecureLine VPN is available as a monthly or yearly subscription for iOS in the Apple App Store.
Watch this video for more information on avast! SecureLine VPN
Thank you for using avast! Antivirus and recommending us to your friends and family. For all the latest news, fun and contest information, please follow us on Facebook, Twitter and Google+. Business owners – check out our business products.
An old scam has resurfaced recently that we want you to be aware of. Scammers posing as computer support specialists from AVAST, Microsoft, Symantec, and even name-brand computer makers such as Dell, have been contacting people via email and phone, including AVAST’s Chief Strategy Officer, Glenn Taylor. The cybercrooks claim that they work for the company’s support department and have received notification that the victim’s computer is infected with malware. They offer to verify the problem and convince the target to allow them remote access to the “infected” computer. After some technical shenanigans, the scammer suggests that the victim needs additional software, which they offer as a solution to the “problem.” The solution can cost as much as $300.
“These scammers prey on the trust of innocent people by tricking them into giving access to their computers,” said Taylor. “If you get contacted by someone that claims your computer is broken or infected, then don’t respond. Either delete the email or hang up.”
In 2012, the U.S. Federal Trade Commission (FTC) cracked down on fraudsters posing as technical support personnel from major companies, but the scam is growing again. Enough so that this week New York State Attorney General Eric T. Schneiderman issued a warning to New Yorkers Tuesday.
Video gamers dedicate thousands of hours of training and spend their own money for the best systems as well as skins, upgrades, and items that show the world their persona. They need to know that their hard work and monetary purchases are protected.
AVAST is proud to announce our sponsorship of Team FNATIC in the 2014 eSports season. Their professional video gamers are tops in the world competing for millions in prize money while thousands of fans cheer them on. Read more about the sponsorship.
“We are extremely excited to be partnering with FNATIC,” said Ondrej Vlcek, Chief Operating Officer at AVAST. “This partnership goes beyond just sponsoring a team in the rapidly growing eSports field. FNATIC will be collaborating with us on future products too. We’re thrilled to have such a prominent and well-loved team as our first partner in this area.”
On Monday between 17:00 and 18:30 CET, several of the most popular professional gamers on Team FNATIC had their streaming games interrupted by a TeamView attack. Their PC was remotely controlled, and the player was logged out of their gaming client. A notepad file appeared with the words, “You’ve been hacked. Fnatic, this is game over,” and other messages.
Here’s a video of FNATIC player nOtail experiencing the attack (NSFW due to language):
About a year ago, we published this analysis about a pharming attack against Korean bank customers. The banks targeted by cybercriminals included NH Bank, Kookmin Bank, Hana Bank, ShinHan Bank, and Woori Bank. With the rise of Android-powered devices, these attacks now occur not only on the Windows platform, but also on the Android platform. In this blogpost we will look at a fake bank application and analyze several malware families which supposedly utilize them.
Original bank application
We will show just one bank application for brevity. For other banks the scenario is similar. The real Hana Bank application can be downloaded from Google Play. It has the following layout and background.
Most people who are using an online dating site will tell you that their goal is to get off of it as soon as possible. But you have to get on before you can find success, so if you’re just starting, you picked a good time. The two months between Christmas and Valentine’s Day see the biggest increase in new membership signups.
Here’s what you need to do to get started: Decide if you want to join a free site or buy a subscription; choose a site that’s appropriate for you from general mega-sites to niche-interest; fill out a series of questions to build your profile; upload some flattering photos; look through the choices and maybe contact a few; then hope for the best.
This Valentine’s Day, also be wise. Apart from the cybercrooks who leave a trail of broken hearts and empty bank accounts described below, be aware that discerning truth from fiction in online dating can be a challenge.
Exaggerating the facts
People embellish the truth often on online dating sites, like the guy who said he was 5’10” (177cm), and then turned out to be shorter than his date at 5’7” (170cm), or the guy who described himself as “athletic and toned,” but was actually shaped like a turkey leg. Or the ones who post a photo of themselves from 10 years (and 40 pounds) ago.
Lying is no use, because eventually you will be found out.
Online dating takes the fact that hopeful people jump to conclusions to a high art. Being both an animal and water fan, I got excited about a guy who said, “I live on a horse farm, and have a house at the river” in his profile. He was entirely truthful – it was my assumption that let me down. Yes, he did live on a horse farm – someone else’s horse farm – over the barn. And he does have a house at the river – not on the river like I hoped, but in the little town named after the river. And it’s not really his, but belongs to his family. And they want to sell it.
If you want to avoid disappointment, keep your expectations low, then be delightfully surprised when you are proved wrong.
Love is in the air! People are going out to buy boxes of chocolates and flowers for their loved ones, preparing for romantic dinners, and some are hoping that a secret admirer will confess their love. Some seek help from the Internet to make Valentine’s Day as romantic as possible and since many people check their emails first thing in the morning, spammers and other cybercriminals see this as the perfect opportunity to attack.
The ILOVEYOU virus from 2000 did just that, although it was sent on May 5th, not on Valentine’s Day. The virus, a computer worm also referred to as “Love Letter,” originated from the Philippines and was sent via email with the subject line “ILOVEYOU.” The virus went viral when users opened the “LOVE-LETTER-FOR-YOU.txt.vbs” attachment included in the email. The opening of the attachment activated the viral basic script, damaging the user’s computer, overwriting image files, and sending copies of itself to addresses in the user’s Microsoft Outlook address book. The virus reached the U.S. on Friday morning, just as people were checking their emails. Since it was sent from someone they knew, and we didn’t have the collective experience of viral spam yet, people trusted the email and opened the attachment. Perhaps they were excited to receive a love letter?