Looking for a product for your device? Free Antivirus for PC, Free Security for Android, Free Security for Mac, Free Security for iPhone/iPad
Looking for a product for your device? Free Antivirus for PC Free Security for Mac Free Security for Android Free Security for iPhone/iPad
Not sure which solution is right for your business? Help me choose
The IRS reports that scam calls have been on the rise in recent years, with thousands of people falling victim to them.
Avast researchers have discovered cybercriminals using an old medium (PDFs) in a new--and dangerous--way.
Defeat the scammers by educating yourself and your employees about these increasingly common tax-related scams.
Avast Business Web Control can help keep your business safer online
Avast researchers have detected a sharp uptick in romance scams--and they're not always happening where you'd expect them to.
What happened with a fake call purporting to be from Amazon tricked a financial advice columnist into handing over $50,000 to a stranger.
A recent report from Mozilla found that the recent explosion of romantic AI chatbots is creating a whole new world of privacy concerns.
Your device will always give you signs that it needs some TLC. Uncover how you can show your electronics some love.
Dive into the world of romance scams, where emotions are exploited, money is the ultimate prize, and scammers lurk behind the mask of love.
Uncover the startling surge in cyber threats from our Avast Q4/2023 Threat Report. Over 10 billion attacks last year reveal the critical need to pay attention.
From overacting to poorly crafted characters, it’s crucial to recognize red flags in cyber-scripts, weak dialogue, and fake chemistry in online interactions.
After AI-generated pornographic images of Taylor Swift went viral on X, we're left asking: What does this mean for the future of AI?
Spoiler: Those ads you're seeing for a new X cryptocurrency endorsed by Elon Musk aren't what they appear to be.
Did you know you're carrying a secret superhero around in your pocket? Introducing: Your smartphone.
With Data Privacy Day coming up on January 28, now’s the time to turn over a new leaf when it comes to protecting your personal data.
Avast researchers take a deep dive into the dangers of downloading pirated software and explain why small businesses should avoid this tempting practice.
While you have your heart set on finding a partner, you should also keep your eyes peeled for the dangers that come with dating in the digital realm.
We kick off the new year with expectations of sales, but beware: a dangerous wave of fake e-shops is spreading on the internet.
ID badges are a two-edged sword, providing security and convenience on one hand, but risking exposure of sensitive data on the other.
A post-holiday poem you can read by the fireplace for the digital age.
Some apps are plain greedy—like a stranger you invite for a meal who insists on ordering everything on the menu. Except instead of the burger, fries, and ice-cream sundae, it’s your data they’re hoovering up. Here’s what you can do to set some boundaries.
Welcome to the most prestigious event in the world of cyber trickery: the first annual Avast Phishing Awards! Join us as we unveil the most noteworthy, side-eye-inducing, and downright dubious email headlines that made this such a year to remember.
The new trend in online fashion: An increase in counterfeit boutiques. Understanding them, recognizing the signs, and actions to take if you're scammed.
Security advice for brand new devices this holiday season
You might not have heard of DNS--but cybercriminals definitely have. Here's how they exploit it to steal your data.
The latest Avast Threat Report identifies the most prominent targets for cybercrime—and it’s us.
Avast's 2024 guide for small businesses: stay ahead of evolving cyber threats and help secure your organization's digital world.
Avast's 2024 guide: AI risks, loan app dangers, chat scams. Stay ahead of evolving cyber threats and secure your digital world.
Make delicious sense of online cookies with Avast and get two signature holiday cookie recipes from chef Carla Hall
By being aware of these common online scams and taking precautions, you can protect yourself and your family from becoming victims this holiday season.
It’s not just the busiest shopping season. For scammers and fraudsters, it’s easily the busiest scamming season, too.
Are you ready to sit down for mashed potatoes and cringe-worthy dialogue? Neither are we. Get ready for the holidays with our list of conversation starters that will keep your family safer and keep you from sitting through an interrogation.
Get ready for Black Friday and Cyber Monday with our expert cybersecurity tips. Learn how to shop online safely with trusted websites, secure networks, and VPNs.
Explore the rise of malvertising in September. Learn about the latest tactics in malicious online ads and how to protect yourself.
Explore the alarming trend of AI-fueled financial scams on TikTok, where deepfake technology is exploited to mimic celebrities, luring users into cryptocurrency schemes that jeopardize their assets and trust in digital platforms.
Reinvent DST Habits: Use “fall back” and “spring forward” moments to not only check smoke detectors and flip mattresses but also strengthen your digital habits by securing passwords, maintaining software, and decluttering your digital files.
An ease and familiarity with wide-ranging tech makes younger generations a bigger target for scams and malware.
Ever wonder if a loved one you’re sitting next to this year could be a cybercriminal? They’re probably not. But you can still familiarize yourself with the types of fraud that take place within the family, just in case.
We often discuss the proliferation and growing sophistication of scams and the tools scammers use. But here’s a reminder—everyone catches a bug once in a while.
The term doxxed is thrown around a lot online. But do you really know what it means?
Researchers at Avast have uncovered a romance scam that utilizes ChatGPT to increase the believability of their online dating conversations.
TV and film depict how hackers and scammers operate to move plots and raise stakes. But is Hollywood delivering stories of real fraud or pure fiction?
Perturbing highlights from the latest Avast Threat Report indicate scammers aren’t just stealing from your computer—they’re working to take it over entirely.
Most of us have a digital identity, and it’s more valuable than you might think
Our young people are always learning. It’s a great time to expand their cyber education to help keep them safe in the classroom.
How to make sure your loved ones can access your accounts if you pass away.
You sure you actually ordered that pair of shoes? Here's how to recognize and avoid package-delivery scams.
Almost everyone meets online these days--and scammers know it. Here's how to tell what's a scam and what could be true love.
When kids leave home, they likely keep the keys to the house. They also might keep information and access that’s better kept under your roof.
There’s a popular scheme that targets online shoppers. But are you savvy enough to spot this scam? Everything you need to know about triangulation fraud.
Fleeceware isn’t just a comfy outer-layer for autumn—it could be the reason your credit card debt is ticking up every month.
Explore the deceptive world of web-based adware, from unexpected prize wins to alluring adult content traps. .
New report reveals disturbing new trends in cyber crime, including a rise in social engineering attacks and a shift toward targeting individuals.
Renting textbooks is usually the cheaper option, but you might end up paying in other ways.
Everyone is looking for a deal on textbooks this back-to-school season. You know it, but so do the scammers. Here's what to look out for with ebook scams.
That .zip file looks legit, but it's actually a sneaky new way for cyber criminals to steal your info.
An unofficial Mario game installs code to use your computer for cryptocurrency mining without permission.
Just because you're paranoid doesn't mean they aren't watching you. Here's the answer to that age-old question: Are my apps spying on me?
Just because that link comes from [your search engine here] doesn’t mean it’s a legitimate website.
We all hate passwords, but they're still an essential part of keep your online info safe. Here's why we hate them--and what we can do about it.
The new Avast Cybersecurity Basics Training Quiz provides training on Data Security, Identity Management, and Social Media Security
TSA can make you take off your shoes, but you might be surprised at the answer to the question: Can TSA search my phone?
In Discord's Family Center, parents can now monitor their children’s online activity to a certain extent, customizing supervision to fit their needs.
How SMBs can effectively protect their networks from cyberthreats – without breaking their security budgets
Avast researchers have unmasked a sneaky little rat in illegal versions of cracked software. His name is HotRat and he's coming for your personal info.
The promise of a free movie download led thousands of people into unintended malware.
Your mother-in-law receiving ads for therapy is completely doable and could prove to be great fodder for humor around the dinner table at the next family reunion.
A deep dive into app permissions and privacy this summer.
The scam exploits human emotions and the innate desire to help others, amassing considerable sums of money from unsuspecting donors.
Virus definition updates will be discontinued for Avast version 9, 10, and 11 by the end of summer 2023.
By staying vigilant and following these tips, you'll be well on your way to a safer, more secure summer vacation.
Sextortion threats are getting a little thirsty – don’t play that game.
Avast discovered 32 malicious extensions with a whopping 75 million combined installs that were available on the Chrome Web Store.
Ransomware has been a prominent threat in cybersecurity for more than a decade, but the rates of incidents are showing slight decline. The Avast Q1/2023 Threat Report examines why.
Avast researchers have observed a significant increase in blocked URL attacks on match days as viewers search for free streaming platforms.
Here's how SMBs can remain viable and thrive in today’s digital landscape.
Invoice scams, where employees receive requests for payment from legitimate sources or routine services, are on the rise. Learn what to watch out for.
By staying informed about potential threats and taking proactive measures to protect yourself, you can continue to enjoy the benefits of Web3 and IPFS while minimizing your risk of falling victim to phishing attacks.
While the potential impact of AI shouldn’t be underestimated, we should also remember that most of today’s threats and exploits are focused on basic gaps in cyber hygiene.
Avast researchers discovered a dangerous vulnerability in Microsoft software, then worked with Microsoft to rapidly patch it.
The Avast Q1 2023 Threat Report reveals a 40% increase in phishing attempts and new malware distribution tactics that exploit trust in established brands like Microsoft and Adobe.
These test results highlight the importance of choosing the right security software and browser to protect against phishing threats.
For small businesses as well as sports teams, making defense a priority can be the difference between winning and losing.
Businesses need to build enough protective measures and mitigating controls to recover and emerge stronger from cyberattacks.
Security risks are one of the most significant concerns when it comes to trading cryptocurrencies, and there are several types of security risks that investors should be aware of.
Organizations and individuals should use a combination of test results, expert opinions, and their own research to make informed decisions about which anti-malware solution to use.
From daily routines to monthly rituals, here’s to your cyber health!
Understanding how to interpret anti-malware test results is crucial when choosing the best anti-malware software for your needs.
The importance of 2FA lies in the fact that it significantly reduces the risk of unauthorized access to people's accounts.
From outdated devices to unchecked settings, here are five tips to attain cyber zen.
All signs indicate that this is simply a scam to scare company decision makers into paying money to avoid further consequences.
From eliminating multiple copies to removing excessive bookmarks, here are five tips to avoid cyber hoarding.
Since macros from the internet have been blocked by default, we've seen different criminal groups trying out new malware delivery mechanisms.
Avast's solutions make it possible for us to identify and protect against new phishing methods as they arise.
There are constantly new scams similar to this one appearing on social media — fortunately, there are straightforward ways to steer clear of them.
From bloated inboxes to unused apps, here are five tips to tackle cyber chaos.
Shaw is a key figure in the history of women in technology, and one who paved the way for so many other key women in the field of video game design.
Avast's presence at this year's SXSW focused on the balance between the exciting discoveries innovative technology brings with a world that has grown increasingly skeptical of the benefits of the digital revolution.
You can protect yourself by learning how to recognize these scams and keep your personal and financial information safe.
What if an attacker could manage to make a well-known company distribute an email on their behalf?
Stalkerware is often installed secretly on mobile phones by abusive spouses, ex-partners, and other close contacts to spy on their targets.
With this comprehensive package, people can enjoy greater protection from new and evolving threats as well as 24/7 premium technical support for IT issues around the home.
Filing your taxes online can be a convenient and efficient way to get your taxes done, but it's important to be aware of the risks and take steps to protect yourself from cybercriminals.
By being aware of these scams and taking steps to protect yourself, you can safeguard your personal and financial information.
Given that each SMB is unique, it's important that the MSP they choose can offer services tailored to their specific needs.
Maintaining a watchful eye is crucial in the ongoing fight against identity theft.
When all you want is to see her live, ending up with a fake ticket will make you feel sadder than Tay Tay in “All Too Well.” So while heartbreak may be inevitable in life, it doesn’t have to come from falling for a ticket scams.
Research related to online dating underscores the importance of conscious digital sharing.
It's important to be vigilant and cautious when receiving text messages from unknown or unexpected sources.
If you suspect you may be a victim of tax-related identity theft, it's important to act quickly and report it to the IRS as soon as possible.
Overall, the Threat Report found an increase in both human-centered and more technologically advanced scams across the board.
This Valentine's Day, keep your online dating life fun and romantic by following these safety tips.
Filing your taxes doesn't have to be a stressful experience – with a little bit of planning and preparation, you can get your taxes done quickly and safely.
The big event attracts a wide range of scam artists who prey on unsuspecting fans.
Currently, there is no widely accepted method for individuals to request the removal of their data from a machine learning model once it has been used to train the model.
AI technology has advanced to the level that it’s now at a pivotal point.
Malicious USBs can allow attackers to obtain a user's passwords, access their devices, and even irreversibly damage their computer.
Cybercriminals are attracted to the decentralized nature and anonymity of cryptocurrencies, which makes it harder for law enforcement to track them down.
The dark web remains a small, hidden part of the internet with strong ties to illegal activities and should be approached with caution.
The hacker group targets a wide range of organizations, including courts, banks, educational institutions, government agencies, and transport services.
Think twice before you add anything to exceptions, even if an antivirus detection dialogue annoys you in the moment.
Cybercriminals use phishing attacks on secondhand shopping sites to scam buyers and sellers in real time.
The day after we found out about this scam, Spain’s national police force arrested 17 people that had been running a smishing fraud scheme and had stolen 145,000 euros from 170 victims.
The Oura’s main focus is on my “readiness,” which they determine by combining information about my heart rate, body temperature, activity information, and sleep data.
With so many fake and counterfeit products on the market, it's crucial to know how to spot the real deal.
Bruce Schneier’s work has withstood the test of time and is still relevant today.
Apple's commitment to privacy is really important as we agree to provide the company with more and more of our personal info.
There are seven common principles that were adopted, all in the interest of serving to the free flow of data across country borders and promoting trust between citizens and their governments.
Here’s an important update to make before you log off for the holidays.
More often than not, great convenience comes with great privacy implications.
The EWC pilot will focus on the use of the EU Digital Identity Wallet in the context of travel – such as providing passenger information, buying goods and services, and trusted business to business interactions.
The time is ripe to consolidate and simplify your security toolsets.
Every new tech toy comes the potential for privacy and security concerns.
With Avast, you can protect yourself and your personal information from these dangerous scams.
Just as there are people working to try and steal your identity for nefarious purposes, so too are there people working hard to prevent that theft.
Samsung, LG, MediaTek, and smaller OEMs are listed on the leaked keys list.
While these trends might seem scary, there are easy ways to protect yourself, your loved ones, and your business.
Be cautious of any delivery messages that ask for your personal data, especially during the holidays.
As part of the takedown, 142 suspects were arrested.
We're presenting some of our top technical research at this year's event.
A reminder that it’s crucial to listen more to others, put down the screen, and be present IRL.
Your computer's performance can be affected by lots of things — find out how to get your PC up to speed.
Avast researchers have identified a new version of an old romance scam, using pictures of beautiful women to try and lure victims in.
Psst! Someone is spying on you.
Bad actors are lurking behind malicious links, fake apps, fraudulent websites, and phishing emails all over the internet — here's how to stay safe.
The Offensive AI Research Lab’s report and survey show the broad range of activities that are made possible through offensive AI.
Never click on any links in emails, SMS, and messaging platforms – especially if the message urges you to take some immediate action.
It’s up to designers to use the right tools and techniques to strike an optimal balance between security and functionality.
Purchased, “verified” Twitter accounts are now being abused in all kinds of ways.
Any significant event is usually (ab)used by cybercriminals that seek to take advantage of people looking for information, tickets, or news.
CISA has two noteworthy considerations in developing the best MFA strategy.
Keep your data and browsing habits private when using public Wi-Fi hotspots.
It can feel embarrassing to be the victim of a crime but, remember: It’s so, so common.
The report found an increase in PC adware activity, continued chaos caused by cyber criminal gangs, and an increase in ransomware in certain parts of the world by a reduction in the rest of the global market.
This section has been routinely vilified by various political groups, who claim that the protections under this section against civil suits should be struck down.
Plus, steps you can take to create a pre-death plan for how to handle online accounts.
Turn off the lights and read these five fearsome frights.
Verified Twitter and IG accounts are in high criminal demand, plus more newsbytes of the week.
From big companies to individuals, phishing affects everyone in today's digital world.
Here’s the key to improving performance and prolonging battery life.
How SMBs can keep data and devices protected - no matter where work is being done.
Read our top articles on how to navigate online safety at any age, with actionable tips to help you protect your family.
We leave a huge digital footprint on Facebook. Did you ever think about what will happen with your data when you pass away?
How much do you know about cybersecurity? This five cyber awareness question quiz will help protect everyone in your family, from the baby to Grandma.
The artist formerly known as Kanye West acquires Parler, and other news bytes of the week.
Facebook, Instagram, and TikTok can be lovely places to share your grief with your community — but they can also be places where people post without thinking.
Setting up a system and sticking to it is worth it if you want to keep your entire family safe, both online and off.
Plus, the reality of BeReal and the bizarre call tricks used by BazarCall.
Some of the more potent lures contain links to pages that appear to be banking sites that then ask you to unlock or purchase a credit card.
To steer clear of cryptojacking attacks, avoid suspicious websites and don’t click on any email attachments.
Our recent research shows that there’s a lack of knowledge when it comes to third parties accessing our search history and how this information is used.
Seven carriers put on notice, plus more news bytes of the week.
Why having a comprehensive security posture is the best strategy.
The social network’s aim is to allow people to share unfiltered moments of their lives. The potential danger comes when those unfiltered moments include information they’d rather not share.
We are witnessing a full-scale cyberwar, in real time, take place in front of our eyes. Cybersecurity and digital freedom are now, quite literally, life and death issues in Europe.
Seemingly innocent searches can tempt you with malware-infested links.
Plus, a new malware is on the rise, and a new hack likely affects a third of all Australians.
Posing as a friend is a particularly good move because we all want to help out the people we love — and, a lot of the time, people we once loved.
As a first step, Avast joins the newly formed Linux Foundation Europe as an inaugural member.
Plus, an airline hack, an Apple bug, media protection in Europe, and a $35 million security penalty.
Dear Avast, I recently hosted a birthday party for my child. I want to post the photos on social media, but I'm not sure if it's OK to post pictures of my kid's friends online. What should I do?
Fortunately, Uber reported this breach and acted on it quickly.
Read this before you hook into that free Wi-Fi and get more than you bargained for.
Roughly a third of all connected devices have insecure defaults, such as no or weak password protection or poor software design, that make them ripe for exploits.
As this attack illustrates, reusing passwords can lead to very real consequences.
Although attacks on large companies dominate ransomware news, smaller businesses make much easier targets, as they often lack the budget to implement successful cybersecurity strategies.
Plus, FishPig gets hacked and Rewards for Justice pays off.
Sending sexy photos can be really fun, but it does come with increased risk of literal exposure.
In the context of the current war in Ukraine and increased authoritarian aggression against free and open discourse on the internet, it's now more important than ever to warn our European audience about the dangers of current new propaganda networks.
Independently successful in delivering digital privacy and security, the companies now combine to pursue a new, joint vision.
Plus, Instagram gets smacked with a fine and a large school district gets smacked with ransomware.
Here are three tips from Shan Boodram on how to #KeepYourPrivatesPrivate with Avast One, our all-in-one cybersecurity solution.
We've rounded up our best back to school advice to help students and their families maintain online safety.
The group's most successful attacks leave sites down for several hours to a few days.
Make sure you know the differences among the various states’ laws, when they go into effect, and whether or not they apply to your particular business.
People are still sharing explicit images without the consent of the people in them, and there still is no federal law criminalizing revenge porn. While it might feel like two steps forward and one step back, the climate today is much better online than it was in past decades.
Hacked Facebook accounts belonging to a Brazilian ISP, Mexican sporting goods store, mountain tourism site from Slovakia, and a computer repair shop in the Philippines are spreading posts linking to malware to users around the world.
Exploring the reasons for ransomware's rise over the past decade as well as measures necessary to start investing in a more secure future.
Plus, LastPass gets hacked and a cryptojacker hides in legit apps.
55% of parents across the UK have expressed concern about the fact their children are more clued up about tech than they are.
...