Business Security

Detection: What you don’t know will hurt you

Detection, the second of the three keys to effective cybersecurity, is essential to identifying existing weaknesses and breaches and having them resolved.

27 February 2017 min read
Threat Research

IoT weaknesses put webcams at risk for attack [infographic]

Cybercrooks could easily watch people in private and public spaces via webcams, stream the video directly to the internet, or turn the device into a bot.

27 February 2017 min read
Tips & Advice

Find out if your home network is vulnerable with Wi-Fi Inspector

Wi-Fi Inspector automatically scans your home network for vulnerable devices and helps address any security issues with step-by-step instructions.

24 February 2017 min read
Avast News

Avast CEO speaking on Internet of Things security at Mobile World Congress

Avast’s CEO, Vince Steckler, will address security threats to the Internet of Things at Mobile World Congress 2017.

24 February 2017 min read
Tips & Advice

Why antivirus alone won't protect you: The anatomy of REAL security software

Antivirus has become multi-layered security, protecting your Wi-Fi network, passwords, and connection. We explain what top security software should include.

23 February 2017 min read
Business Security

Targeting SMBs’ threat tolerance concerns

Success in the cybersecurity service business can be enhanced by addressing your SMB prospects’ threat tolerance issues and concerns.

23 February 2017 min read

Visit Avast website

Security News

Behavior Shield: our newest behavioral analysis technology

Behavior Shield comes standard in all versions of Avast 2017, protecting you from zero-second threats, ransomware and other malicious programs

21 February 2017 min read
Tips & Advice

CryptoMix: Avast adds a new free decryption tool to its collection

Avast now provides a decryption tool for ransomware CryptoMix (offline only)

21 February 2017 min read
Business Security

Prevention: One-third of a healthy cybersecurity regimen

The framework of an effective cybersecurity strategy rests on three pillars - prevention, detection and resolution - and all three are necessary.

17 February 2017 min read
Business Security

Who you gonna call? CyberThreatBusters!

Facing a growing range of internal and external cyberthreats, and a shortage of skills and resources, SMBs’ best option is to partner with CybSec specialists.

15 February 2017 min read
Security News

Avast's HTTPS scanner receives A rating

Researchers have identified Avast as the only antivirus product that does not degrade the client’s security when scanning HTTPS traffic.

14 February 2017 min read
Business Security

BYOD: Untrusted at best, compromised at worst

In an increasingly mobile-first world where most devices are personal, you must be the first line of defense protecting critical data from loss or theft.

13 February 2017 min read
Load more articles (12)