Protecting over 200 million PCs, Macs, & Mobiles – more than any other antivirus

Archive

Posts Tagged ‘privacy’
August 7th, 2013

Top mobile phone apps snoop into your business

mobile apps1It’s easy and fast to download apps to your smartphone. They do everything from identify a song you just heard to turning your phone into a flashlight. But there are secrets lurking beneath the fun apps. See how knowledgeable you are about the risks associated with free and paid apps for your smartphone. Answer the question, then read on to check if you were right.

1. Which is riskier?

  • Free mobile phone apps
  • Paid mobile phone apps

If you chose free mobile phone apps, then you are correct. Overall, 83% of the 100 most popular apps are associated with security risks and privacy issues, according to a new analysis by Appthority. The interesting point this study make is that these aren’t just any old apps, these are the games, productivity, and communication tools created by major publishers like Disney, Entertainment Arts, and Rovio. Analysts also found that paid apps aren’t as safe as you think. While 95% of free apps exhibited at least one risky behavior, so did 78% of the top paid apps.

TIP: avast! Free Mobile Security identifies potential privacy risks, by scanning and displaying access rights and the intent of your apps, so you know how much info you are really providing to each app. Read what Consumer Reports says about avast! Free Mobile Security.

 

2. Which is safer?

  • Apple’s mobile ecosystem
  • Android’s “open” platform

Read more…

Comments off
August 6th, 2013

What’s hot on social: security and privacy update 2

Millions of users access Social Networks every day in order to share, engage, and look for information as well as entertainment. The transparency of social networks come with a risk and we are very often expose ourselves to hackers and scammers that can take advantage of information we share. Social platforms constantly improve security and privacy settings, to deliver a safe experience to the users, but who has time to follow all this news? Well, you can relax and rely on us. AVAST specialists are here to deliver this information in an accessible way.

Last month we warned you against the  four sneakiest Facebook scams. Now we have a summary of the latest security and privacy related news. Check it out and enjoy a secure social media experience!

_fb_icoNew, secure https connection on Facebook

At the end of July, Facebook announced that it will migrate all users to the https connection.  HTTPS - Hypertext Transfer Protocol Secure is a communication protocol primarily used to ensure a safe internet connection. For Facebook users, this means a safer experience, when communicating between a browser and Facebook servers.

Facebook first offered it to users in 2011, as an optional setting. However from now on it will be a default one, so the good news is that you don’t have to change any settings.

Now this is what you will see in your browser, when accessing Facebook.

HTTPS connection

 

New anti-bullying features on Facebook

During the last week of July, Facebook announced that,

Child psychologist Marc Brackett, director of the Yale Center for Emotional Intelligence, is working with Facebook to develop what he says is the first emotionally-intelligent bullying prevention system on a social network.

Read more…

Comments off
July 18th, 2013

Six reasons to use avast! SecureLine VPN when traveling

Whether on business travel or vacation, you don’t want to worry about the security of your devices when you connect to the internet. Using a WiFi network in a café, airport, or hotel is a serious security risk that requires additional protection to secure your data and computer.

avast! SecureLine VPN is now completely integrated into all of AVAST’s free and premium products. Here’s the top 6 reasons why you should use avast! SecureLine VPN:

1. Hides your data from thieves – avast! SecureLine VPN encrypts your public WiFi communications. That means that someone snooping on you will see a bunch of gibberish instead of your email, files, passwords, etc.

2. Keeps eavesdroppers from listening to your VOIP calls – avast! SecureLine VPN makes your voice or video conversations through the internet using Skype or Viber, for example, safe and secure by encrypting your conversation. This allows you to talk to people without fear of being eavesdropped on by cybercrooks, your ISP, and even the government! Read more…

June 17th, 2013

AVAST welcomes secure.me users to blog, Facebook, and Twitter

secureme_by_avastAVAST welcomes all secure.me users to our blog, Facebook page, and Twitter feed, where you can learn the latest about social media privacy from your favorite secure.me team members.

In the coming weeks, secure.me will be fully integrated into AVAST and even get a new name, but you will still enjoy the safe and carefree online experience that you have grown to appreciate. If anything, it will be enhanced through the joint powers of AVAST and secure.me.

We invite you to continue your relationship with secure.me here on AVAST. Become an AVAST fan, follower, and blog reader to stay informed about the latest in security and privacy.  As you make the transition with us, we ask that you take a look around, and give our famous avast! Free Antivirus or one of our premium paid products, avast! Pro Antivirus, avast! Internet Security, or avast! Premier a try. You can compare products here, and look for deals at the avast! Store.

Thank you and welcome to AVAST!

Comments off
June 4th, 2013

New High School and College Grads – Read This!

Social media profiles affects college admission, job searches, and careers

career endingA 24-year-old high school teacher in Georgia, USA, lost her job after an anonymous e-mailer complained about a Facebook picture of her sipping wine and drinking beer while on vacation in Europe. An Arizona woman was fired after ranting on Facebook when she was passed over for a job promotion. An 18-year-old Buckingham Palace guard was fired after he called Kate Middleton a ‘stupid stuck up cow’ in a Facebook post. A star high school football recruit lost his scholarship to the University of Michigan because of vulgar tweets.

By now, you know that you should not reveal personal information to strangers or on your Facebook profiles, and that you should utilize the privacy settings on social networking sites.  You also need to be careful with what you are posting online because potential employers or college admission officers could be looking at your page.

A newly published report tells us that 1 in 10 people between ages 16 and 34 have been turned down for a new job because of photos or comments on Facebook, Twitter, Pinterest, and other social networking sites. “The majority (two-thirds) are not concerned that their use of social media now, may harm their future career prospects and are not deterred from using it,” states ondevice research,  “They are also more likely to have altered their social media profile to look good to their friends, as opposed to prospective employers.”

 

on_device_chart

If you can’t live without social networking, especially Facebook, during your job search, use it to your advantage.

  • Give your profile a makeover. Prune old posts to highlight what’s great about you instead of what you ate for lunch in 2010. Either delete or restrict the view to images and albums that don’t show you in your best light. Get a handle on tagged photos by setting ‘Review Posts Friends Tag You in Before They Appear on Your Timeline.’
  • Build a compelling professional profile. Show off your strengths and accomplishments. To keep it personal as well as professional, add interests, hobbies, volunteering, educational information, and professional pictures.
  • Follow and engage with companies and career–related groups on LinkedIn and Twitter so you’ll know about company hires and other news.
  • Add value to the company you are interested in by participating in conversations, answering questions, and sharing links. Make sure you use solid grammar and communication skills.

If your Facebook profile is beyond help, then consider deactivating it for a time. The deactivation option gives you the flexibility to leave and come back whenever you want. Select Account Settings>Click Security in the left-hand column>Click Deactivate your account.

Thank you for using avast! Antivirus and recommending us to your friends and family. For all the latest news, fun and contest information, please follow us on FacebookTwitter and Google+.

Comments off
October 5th, 2012

Let’s Also Make This Cybersecurity *Policy* Awareness Month

As we have recently mentioned on our blog, October is National Cyber Security Awareness Month. And I’m sure we will post more to raise awareness of the risks you personally face, the risks to the institutions you do business with, and to the government itself.

Today, though, I want you to start to broaden your outlook on this issue. While you are getting acquainted with new threats like nation-state funded attacks, cyber-terrorism, and hactivism, I’d also ask you to look at some of the things our legislatures have been proposing in the name of cybersecurity. This includes early efforts to protect critical industry sectors our energy grid or banking systems against cyberattack, and requirements that we move beyond passwords when we access Web sites where we perform transactions or access personal data. As all these initiatives come with costs, none have universal support. But some cybersecurity proposals have generated more controversy than others, including: like the SOPA and PIPA bills that coddled the media industry by conflating digital piracy with cybersecurity and whose proposed remedies would have create a regime of censorship, or the federal development and control of a so-called “Internet Kill Switch“.

There will continue to be a lot going on here legislatively, and anything that changes the government’s role in the Internet will affect you as well. So let’s make also do our job as responsible, informed citizens. Let’s make October National Cybersecurity Policy Awareness Month. Let’s get educated, and involved.

 

April 3rd, 2012

Privacy Losses: Cybersecurity Efforts Move Us Towards A Big-Brother Nation

My last post was about how we’re steadily moving towards consumer online privacy regulations over the collection and use of personal online data by businesses. At the same time, however, we’re seeing the US government relentlessly expanding their efforts to monitor people online – and in ways that may completely negate any efforts to regulate the privacy practices of businesses.

It is the fear over cyberterrorism (a term you can’t expect the average person to understand) that is driving many to cede their privacy rights to the government. There are two competing cybersecurity bills working their way through Congress: the Cybersecurity Act of 2012 and the Secure IT Act. They differ fundamentally in areas of jurisdiction (the NSA versus the DHS) and whether the voluntary approach promoting and fostering public-private collaboration is sufficient, or a whether a regulatory approach is also required. But what they have in common is the aggregation and analysis of data on unprecedented scales.

In the background to all this, the Obama administration has just expanded the ability of the National Counterterrorism Center (NCTC) to retain data on people for five years (previously, it was 6 months) – even if they are not suspected of terrorist activity. The NCTC receives data from many other agencies.

So at the same time one side of the US government (the consumer protection side) is restricting what personal data businesses can collect, another side (the cybersecurity side) is moving not only to expand its own access to and control over personal data, but also to enlist in its efforts those very same businesses whose data collection efforts the FTC is otherwise trying to restrain: ISPs and mobile carriers, search engine and web portal companies, social media companies, etc. This opens a very wide door to abuse of any consumer privacy efforts currently underway with the FTC.

March 28th, 2012

Privacy Gains: The FTC Begins Move To Protect Consumers Online

Monday, the FTC released a report publishing principles and recommendations for consumer privacy. The report, “Protecting Consumer Privacy in an Era of Rapid Change” (summary and full report[PDF]) provides what the FTC considers best business practices around privacy. These best practices are not regulations, but they are intended to serve as guidelines for legislators in drafting privacy regulations. And they can also serve as a framework for the federal government’s own privacy policies and personal data practices.

At the core of the report, and in broader privacy circles, we see discussions center around three foundational elements of privacy: knowledge, consent, and control.

  1. Knowledge. The collection and use of information should be transparent. Consumers should know what is being collected, how it is being collected, how it is being used, and how it is being shared.
  2. Consent. Consumers should be presented with a mechanism for agreeing to these practices. The recommendations did not mandate an “opt-in” versus “opt-out” approach: whether the default policy if the consumers don’t take any specific action would be not to collect (“opt-in”) or to collect (“opt-out”). But the report does advance the notion that it is insufficient for organizations to provide an all or nothing approach, where conditions on use of a service or product requires you to submit to full data collection.
  3. Control. Consumers should have choices as to whether and to what degree, to participate in data collection, and how that data could be used; and companies should make those choices simple for consumers to understand and to execute.

Consumer attitudes about privacy and data collection is undergoing a fundamental change, driven by online data collection practices. Historically in the US, businesses have traditionally been given broad latitude in their actions as long as they are not fraudulent or deceptive. However, we’re witnessing a full 180-degree turn in consumer attitudes, which is what’s behind the FTC’s actions. Consumer concern over personal data collection and use by businesses is reaching critical mass, and it’s driven by concern over Internet powerhouses such as Google and Facebook, mobile carriers and ISPs, and  the shadow worlds of online advertising networks and data brokers. Restraints on businesses over their privacy practices are inevitable.

Unfortunately, not all the consumer privacy news these days is good. More about that in my next post.

Categories: Uncategorized Tags:
March 20th, 2012

The Latest Threat To Your Mobile Phone: Your Employer

The RSA Conference – the largest gathering of security vendors and the companies who buy their products – was held in San Francisco last month. Avast was in attendance, and I had the pleasure of moderating a panel on mobile security. Mobile security was also one of the top topics permeating the entire event. What I heard on the panel and throughout the conference, and what has been reinforced from my discussions with analysts and consultants to businesses, should have you all pretty worried.

The good news is that businesses want to embrace employees use of mobile phones and tablets. And it’s not just the biggest companies doing so: even small businesses are eager adopters of mobile technologies. After all, employees are more accessible and more productive when they can use their mobile devices for work. However, these are your devices; they are not the company’s and shouldn’t be treated as such. And that’s the challenge.

Businesses have legitimate concerns that these devices are inherently insecure, and that consumers don’t always secure their devices to the same level businesses do their PCs. They are also concerned about all the corporate data that these devices contain or can access, and that their loss or theft can compromise a company. And they are concerned that people will misuse their access to this data now that it’s on their person device.

The problem is that businesses want more security and control over your phone then they should have or even need: even more control than they have over the PCs they provide you.

  • Because there are malicious apps, they want to keep a catalog of every app you install and be able to remove those applications without prior notice to you.
  • Because mobile devices can hold private corporate data, they want the ability to wipe all data on your phone, also without prior notice to you.
  • Because you could potentially misuse the phone by transferring corporate data between a business app (like email) and a personal app (like Facebook), they want to be able to monitor everything you do on that phone: your call logs, your text messages, all your social networking activity, all your browsing activity.

This blatant company disregard for employees’ privacy and property all in the name of security has gotten completely out of hand. One product that was given prominent attention at the conference basically rooted your device to put a monitoring and management layer underneath the operating system. Besides taking any semblance of control of your device away from you, this procedure would likely lead to voiding the warranty for many of your devices, especially Apple devices.

Using your mobile devices for work purposes should not require you giving up all your privacy rights or giving your company effective ownership of your device, without having to pay for it. If your company is letting you use your phone or tablet for work purposes, especially if it’s for more than email, then you should take a close look at your organization’s mobile policies – not just for what you should or should not be doing, but for what your company could be doing.

January 20th, 2012

I’ll show you my password, if you’ll show me yours

On the heels of the Zappos cyber robbery last Sunday that left 24M customers fretting over stolen passwords and email addresses, articles are being published about how people can protect themselves online. The number one point is always about passwords. Clean up your passwords. Never Share Your Password. Create different passwords for different accounts.

Sage advice, which we at AVAST support. We even have a dedicated password manager called avast! EasyPass to help you juggle it all. The theft at Zappos and the struggle for greater online privacy made it even more startling when I read about the growing trend among teenagers to share their passwords as an act of trust with their current BFFs. Read more…