Há algumas semanas falei aqui sobre um memê que a minha irmã publicou no Facebook satirizando o nosso dia a dia atual em que oferecemos às visitas a senha da conexão Wi-Fi de casa em vez de um copo d’água ou café. Parece que muita gente não consegue mais viver sem ela: a internet. Estamos conectados 24 horas por dia, 7 dias por semana. Minha mulher recentemente até colocou uma nova regra em casa: o último a ir pra cama tem de desligar a Wi-Fi ou então fica sem chocolate no dia seguinte. Como tenho de perder alguns pesinhos a mais que ganhe no Natal, confesso que passei em branco algumas noites, o que me fez pensar: será que nosso dia a dia realmente se tornou totalmente digital?
A fabricante de hardware HP lançou no mês passado uma nova linha de tablets que me deixou com a pulga atrás da orelha. Onde vamos chegar neste mundo cibernético?
O lançamento se trata de um tablet capaz de captar um desenho feito em papel e imediatamente digitaliza-lo na tela do dispositivo. Além disso, a empresa ainda lançou um aparelho especialmente voltado para uso em hospitais, o qual possui uma capa protetora que impede a proliferação de bactérias. Assim, médicos poderiam utilizar um mesmo equipamento para visitar diferentes pacientes.
Em outras palavras, os dados de um único hospital (ou de uma ala de um hospital) poderá ser gerenciado de um único aparelho. Por um lado isso é muito positivo, pois dá a médicos e enfermeiros uma maior mobilidade e independência. Por outro, facilita o desenvolvimento de técnicas de roubos de dados de pacientes e informações sigilosas armazenadas online.
Quando o governo alemão anunciou há cerca de 6 meses que iria catalogar todos os seus dados em folhas de papel e guarda-los em gavetões trancados a sete chaves, muita gente chegou a dizer que isso é um exagero. Mas polêmicas à parte, isto mostra como o nosso mundo cibernético está cada vez mais complexo e preocupante.
Se no passado bastava apenas instalar um antivírus em seu computador para se sentir seguro online, hoje em dia é necessário mais do que isso. É preciso também manter certos cuidados online, principalmente em mídias sociais. Além do mais, temos de entender como nossos dados estão sendo guardados em bases de dados de terceiros e como os mesmos estão sendo manipulados. Uma tarefa extremamente difícil em um mundo em que há aplicativos até para pedir pizza…
Uma dica é manter o controle dos formulários que preenchemos online e off-line. Se há alguma desconfiança, então não preencha. Se não for usar aquele serviço mais, peça o cancelamento do seu cadastro e, por fim, mantenha seu computador, tablet e smartphone com um antivírus instalado e atualizado.
Uma outra dica é usar o VPN (Virtual Private Network), um recurso muito útil para pessoas que viajam com frequência e geralmente acessam internet aberta, como em shopping center, estádio de futebol, hotel e aeroportos. O VPN faz com que a sua navegação fique oculta em uma zona privada, portanto, se houver um ataque àquela rede, seu aparelho não será afetado.
Por fim, muito cuidado com suas senhas de acesso a e-mails e contas do banco, procure muda-las com frequência, principalmente se as mesmas são usadas para acessar perfis em redes sociais como o Facebook.
O nosso dia a dia digital nos obriga a dar uma atenção redobrada aos nossos dados online, mas não significa que você deva entrar em pânico e deletar todos seus perfis na internet! Simplesmente, mantenha-se precavido e estará seguro!
The holidays are here and many are opting to shop online for their holiday gifts, whether it’s to avoid the crowds or because time is running out. Online shopping is a convenient option, everything is almost guaranteed to be in stock, there are no lines and your purchase gets delivered to your doorstep. But, can this season’s holiday shopping come back to haunt you online?
Ad networks, whether via browser extensions or cookies, track your online browsing activities to target ads tailored to your interests. Some see this is as a good thing as you are only shown ads for products or services that would be useful for you, while others may think it’s creepy that the Internet knows about your guilty pleasures. The holidays are about giving and generosity, so your online browsing activities may differ from what they are the other eleven months of the year. You may be researching whether you should purchase a round or square shovel for Uncle Jack, who put gardening tools on his holiday wish list, or which game you should order for your daughter. Now, do you really want to have ads for gardening tools and games for kids following you around the Internet?
How to shop undercover
Whether you want to protect your privacy or simply want to avoid targeted ads that may result from holiday shopping for family and friends, Avast is here to help!
Avast Online Security comes with a Do Not Track feature. Do Not Track identifies tracking software and shows you a list of all tracking and analytics programs that are trying to track your online behavior. You then have the option to choose which tracking software you want to deny or allow to track your online behavior.
By denying tracking software, you eliminate your digital footprint and exclude targeted ads from following you while you browse. Most browsers do come with some form of Do Not Track, but they rely on HTTP Do Not Track headers. Avast on the other hand uses proprietary technology that cannot be overridden by servers.
Avast Browser Cleanup is another tool that will help ward off targeted ads. Browser Cleanup removes unwanted or poorly rated toolbars that could also be keeping an eye on your browsing sessions. Since Avast Browser Cleanup launched in February 2013, it has identified more than 40 million different toolbars, 95 percent of which have been rated as “bad” by Avast users.
Leave the tracking this holiday season to shipping companies and the post office, not online advertising! Avast wishes you and your loved ones safe and happy holidays (and shopping )!
Would you like a sneak-peek into our new version of avast! Mobile Security before the official product release? The opportunity is here. We are looking for advanced Android users to participate in the avast! Mobile Security Beta test. This Beta test will run until August 31, so you have plenty of time to test everything. Your valuable feedback will be incorporated into our product before going public to millions of users, so your participation is vital.
Help our development team by being part of the beta testing team. We need your input!
Here’s how to join the avast! Mobile Security Beta test:
- Join our beta community on Google+
- Click on the avast! Mobile Security (beta)
- Click on “Become a tester”
- Download through Google Play on your device
What we expect from you?
- Provide us with your feedback on the new interface, with a special focus on graphical issues and issues with translations
- Report all potential bugs you find, preferably with print screens
- Give us your suggestions for improvements, additional features, and solutions
Where you can submit your feedback?
Every active participant who provides feedback will receive a 1-year avast! Mobile Premium license.
The new interface has already received praised from beta testers. We want to hear from you. Join the Google+ Mobile Security beta testers community now.
Thank you for using avast! Antivirus and recommending us to your friends and family. For all the latest news, fun and contest information, please follow us on Facebook, Twitter, Google+ andInstagram. Business owners – check out our business products.
AVAST has more than 1 million mobile malware samples in its database, up 900,000 from 2011.
Yet the majority of mobile users seemingly have never been affected by mobile malware. Have you ever wondered why that is?
Unmistakably malicious malware, like ransomware or malware that is designed to send premium SMS behind users’ backs, is available on underground hacker forums. Yet truly malicious malware rarely hits the mass market, because they get blocked by security apps like avast! Mobile Security and are not tolerated on the Google Play Store. This protection saves the majority of mobile users from encountering malware, which is why mobile malware seems like a myth to many.
While it may take time for mobile malware authors to successfully circumvent official app market policies, there are less malicious ways app developers are taking advantage of app users. These app developers are taking advantage of the fine line between malicious and innocent apps, using sly tactics to go behind users’ backs.
PUPs – Potentially Unwanted Programs (not as in puppies)
Apps whose behavior blurs between malicious and innocent are classified by avast! Mobile Security as Potentially Unwanted Programs (PUPs). Apps classified as PUPs act innocently enough to be considered as not malicious, but contain undesirable characteristics, which can be boarder line malicious. Their features can be used maliciously, if the app developer chooses to do so.
Information hungry apps
App developers are allowed to request access to certain functionalities and data on your phone so their app can function properly. For example, a map app can request permission to access your location, to provide you with directions from your current location to your desired destination. Some app developers, however, take advantage of permissions by either requesting additional information or completely irrelevant access from what their app requires.
In March, I found an app that did just this, and at the time of its discovery, it was available on the Google Play Store. The app was called Camera Nocturna, a night vision app that requested much more than access to the phone’s camera. By accepting Camera Nocturna’s permissions, the app also gained access to contacts and the permission to write SMS, which it used to send premium SMS behind users’ backs. The app has since been removed from the Google Play Store.
Always use caution when downloading apps, and pay careful attention to the permissions the app requests. If the permissions don’t seem to match the app’s functionalities, don’t accept them. Google has recently changed the Android permissions section in the hopes of making app permission requests simpler. Despite this, app downloaders should remain cautious. The change by Google groups permissions into categories. This allows apps to receive new permissions automatically, without being explicitly granted permission by the user if the permission falls under the same category as a permission that was previously granted by the user.
Thank you for using avast! Antivirus and recommending us to your friends and family. For all the latest news, fun and contest information, please follow us on Facebook, Twitter, Google+ andInstagram. Business owners – check out our business products.
The U.S. is on the soccer field: Our own triple-threat celebrity, Jennifer Lopez, performed at the opening ceremony; Facebook set up a special “Trending World Cup” news feed; Twitter predicts the most tweeted global event ever; Google search features a daily soccer doodle; and the U.S. is playing its first game in the tournament today.
The 2014 World Cup is more digital than any other soccer World Cup. At AVAST, we wanted to understand how people will watch and participate in the tournament this year. In a survey of more than 3,000 AVAST users in the U.S., we discovered mobile devices will play a big part: Two out of three American soccer fans will use their smartphone or tablet to enhance their World Cup experience.
Soccer news, live scores and vuvuzela sounds on smartphone
Highest priority for Americans is to stay on top of the game results with more than half the fans reporting they will check the live scores from their smartphone. One-third said they will read news about the games on their smartphone or tablet and one-fifth will live stream the games on their mobile device. Many will certainly be interested in the results as they placed a bet. The best strategies to bet on the winning team have been discussed and people are already well into betting fever. One out of ten survey respondents will use or have already used their smartphone or tablet to place bets.
There is even more that can be done on mobile. For six percent of respondents, collecting and trading stickers of the players has moved from the paper booklet to digital albums in the cloud. And what would a World Cup be without the famous BZZZZ vuvuzela sound? Cover your ears – this year you can expect to hear a cacophony of digital horns: One in 20 intend to use a mobile app to sound the vuvuzela.
Instead of just following the games, every eighth American fan wants to become a world champion themselves – and will play soccer games on their mobile device.
For all mobile activities, nearly half of Americans stick to the official FIFA apps, the majority mixes official with unofficial apps or only go for unofficial apps. It’s great for fans to have a wider variety of apps to choose from, but beware, we found some gaming apps that are fake, they won’t let you play and instead just want to collect your data and show you ads.
One out of five will live stream the games on smartphone or tablet
The majority of Americans will still watch the games the traditional way – eight out of ten – on the TV at home. However, digital sources are slowly taking over: 40 percent will watch the tournament on PC and on the smartphone and tablet 21 percent will watch.
Now who do Americans think will win?
Americans’ faith in their own team is low! Only eight percent think the U.S. team will win. Instead, all bets are on the World Cup host: One-third of Americans pick Brazil to take home the cup.
World Cup safety tips
At AVAST, we think we can all be winners if this will be a safe World Cup. Using your smartphone and tablet during and after the soccer World Cup, make sure you are protected:
- Only download apps from the official Google Play store
- Choose apps from official sources and read what others are saying about them
- Take a close look at the permissions an app requests and question if they are necessary for the apps’ functionality
- Use antivirus on your PC, smartphone, and tablet
- If live streaming the games on public Wi-Fi, make sure you are protected with a VPN solution encrypting your communications such as avast! SecureLine
Have you ever been on a long road trip with your children? Then you will agree: It’s great to have something to entertain your children, to distract them from the boring drive. Today smartphones and tablets are a great source to keeping kids occupied for long periods of time, not only on the road. AVAST has found out that four out of five parents share their mobile devices with their kids. This is the result of a survey AVAST conducted amongst 1,500 parents in celebration of today’s International Children’s Day. Children are very tech-savvy and technology can be a great teaching tool, if kids use it appropriately. However, our survey results show that kids don’t always choose the most kid friendly apps and activities while using their parents’ devices.
11 to 15 year olds seem to be the most curious – and most at risk
Many kids do mischievous things once they get their hands on their parents’ devices, however our survey has shown that 11 to 15 year olds are most likely to use smartphones and tablets for risky activities. It’s not surprising that anything inappropriate is interesting to kids; 32% of parents admitted that their child has accessed adult content using their mobile device. More than half of these kids were between the ages of 11 and 15 years old. The risk here is not only the child getting in contact with adult content, but the whole device and other family members are at risk as well: Mobile sites and ads including adult content often lead to phishing sites or sites including malware that is downloaded with the tap of a finger.
Sending messages in their parents’ name, behind their parents’ backs also seems to be a fun thing for kids to do, with 19% of parents claiming their child has hit the send button. Again, the sneakiest age group is 11 to 15 years old, 45% of messages were sent by them. If children send text or social media messages in their parents’ name, this can lead to embarrassing situations – or cause real damage, e.g. if a child sends an email from their parents’ business email address.
In addition to this, 7% of kids accessed apps that contained banking or credit card information and 6% used their parents’ device to make purchases without their parents’ knowledge. Once again the age group 11 to 15 years was the one caught red-handed the most – 44% of the 7% of kids that accessed apps containing banking and credit card information and 52% of the 6% of kids that made purchases were 11 to 15 years old.
Many children and teenagers have their own devices
AVAST asked the 20% of parents who don’t share their devices with their kids, why they choose not to do so. Of these, 38% said their kids have their own devices, 40% think their kids are too young (between the ages of 0 to 10 years old), and 22% don’t trust their kids. Out of the 22% that said they don’t trust their kids with their devices, 11 to 15 years old was the most mistrusted age group. Despite this, of the 38% parents that said their kids have their own devices, 48% are between the ages of 11 and 15. Based on what parents caught their 11 to 15 years doing with their mobile devices, can you imagine what these kids may be doing if they have their own device?
Safety tips for kids using mobile devices
Be aware of the sites your children are visiting. The Internet contains everything from cute cats to adult films – do you know which your kids are accessing? Talk to your kids, let them know that not everything online is necessarily safe and keep an eye on what they’re doing online. Also, often apps and ads with adult content can link to malicious sites– so make sure your device is safe. Install an antivirus app like avast! Mobile Security on your phone to protect you and your family.
Lock apps that can make purchases. Any apps containing banking information or that have credit card information saved to make purchases should be password protected, whether your child has their own mobile device or borrows yours. App stores such as Google Play and iTunes make it easy to purchase apps, all you have to do is type in your account password. Even if you don’t think your child knows the password, make sure you add a second layer of protection by password-locking certain apps.
Talk to them about messaging apps. In one of our recent blog posts we discussed the importance of talking to your kids about cybersecurity, especially when it comes to messaging apps and social media. Whether they are borrowing your phone or using their own device, talk to your kids about what information they should share, who they should talk to online and how they should be talking to others.
Talk to them about the value of money. Kids may not realize that the things they order or download online cost actual money. The fact that they can’t visualize online transactions makes it seem like the things they are ordering online must be free! Come up with an agreement, either allow your kids to make purchases online if they consult with you first, or if in the instances of apps, they are free. You could even give your kids app store gift cards as their allowance.
AVAST Software is a global leader in the security field. With nearly 220 million activly protected devices and its users we can call ourselves the most trusted antivirus company in the world, especially since 60% of our users install avast based on recommendation. This is already a solid reason to join the AVAST team, but is that all that AVAST is about? No!
1. AVAST has the X-factor. Voted Czech Republic’s Best Employer
If you are talented and creative and want to show it off, AVAST is the place for you! Become one of our code masters, product ninjas, customer care gurus, ecom commandos, marketing geniuses or an indispensable!
AVAST is headquartered in Prague, one of TripAdvisor’s Top 5 Cities in the world for 2014. With the largest castle in the world and historic gothic churches, as well as a lively music scene complemented by top-tier restaurants, Prague is a city that has learned to dance easily between the ancient and modern. Not mention, the cheapest beverage you can get in the Czech Republic isn’t a tap water, its legendary Czech beer! :)
3. Size matters!
The AVAST team is the perfect size with approximately 400 people. We are not a large, anonymous corporation! There is a great chance you will meet new friends and perhaps even your soul mate ;). Amongst our employees 20% are women and we speak more than 40 languages, including everything from Chinese and Japanese to Arabic and Hebrew. We have 30 different nationalities on our team!
4. Your place to grow!
You will get a chance to develop professionally in many fields. Our experts visit and speak at prestiges conferences and trainings, we even offer Czech languages courses!
The AVAST forum is currently offline and will remain so for a brief period. It was hacked over this past weekend and user nicknames, user names, email addresses and hashed (one-way encrypted) passwords were compromised. Even though the passwords were hashed, it could be possible for a sophisticated thief to derive many of the passwords. If you use the same password and user names to log into any other sites, please change those passwords immediately. Once our forum is back online, all users will be required to set new passwords as the compromised passwords will no longer work.
This issue only affects our community-support forum. Less than 0.2% of our 200 million users were affected. No payment, license, or financial systems or other data was compromised.
We are now rebuilding the forum and moving it to a different software platform. When it returns, it will be faster and more secure. This forum for many years has been hosted on a third-party software platform and how the attacker breached the forum is not yet known. However, we do believe that the attack just occurred and we detected it essentially immediately.
We realize that it is serious to have these usernames stolen and regret the concern and inconvenience it causes you. However, this is an isolated third-party system and your sensitive data remains secure.
CEO AVAST Software
Have you heard about Heartbleed? Yes? Then you belong to a minority. Following the Heartbleed threat, the bug that took advantage of a vulnerability in OpenSSL, AVAST conducted an online survey with 268,000 respondents worldwide and found that three out of four people were not aware of the the Heartbleed threat, which affected millions of sites and mobile apps.
AVAST then explained Heartbleed to these respondents. When asked if they would change their passwords after checking which sites were affected, nine out of ten said they would take action. This high number is interesting from a psychological standpoint as it shows how people think when initially confronted with a threat. People immediately plan on taking the appropriate measures to protect themselves against future threats, but how many actually follow through with their plans? In reality, less than half of people follow through with their security plans: Only 40% of the respondents who were aware of Heartbleed said they had actually changed their passwords. This number closely matches Pew’s Heartbleed report which found that 39% of Internet users have changed their passwords or canceled accounts.
“This kind of thing never affects me”
Many respondents, both those aware and unaware of the threat, said they don’t want to change their passwords because they don’t believe their accounts have been compromised. This makes one wonder if the 41% of respondents who were aware of the threat, but don’t believe they have been affected, either think the media has exaggerated the issue – or if they have a “this kind of thing never affects me” attitude. One in ten respondents believes that the next security breach will happen soon and they therefore don’t see the point in changing their passwords. This laissez-faire attitude could be caused by the fact that many have not seen concrete repercussions of the threat or have not yet been directly notified of the threat by the platforms they use. One of the most concerning facts revealed by the survey is that many people lack the know-how to protect themselves. One in ten respondents hasn’t changed their passwords because they don’t know how to change them.
Furthermore, almost half of both respondents, aware and unaware of the threat, said they would change their passwords once the affected platforms have implemented patches and informed them of the changes.
Passwords are like keys that protect our sensitive data online, just as locks protect the precious objects in our homes. It is recommendable to stay away from affected sites that have not yet issued patches. Once sites have implemented the necessary fixes, passwords should be changed and strengthened with the same manner of urgency as you would change the locks on your home if you were to lose your keys or if your key were to get stolen.
Use a password manager to protect all of your accounts with ironclad passwords
Changing and memorizing new passwords over and over again isn’t easy, especially since passwords should consist of at least eight characters – or according to latest recommendations even sixteen or more. They should include a mix of letters, numbers and symbols.
A password manager like our avast! EasyPass helps encrypt and protect personal information online. avast! EasyPass creates strong, random passwords of up to 512 characters and secures your information via military-grade encryption, making password management simple and secure. avast! EasyPass is currently available at a discounted price of $9.99 a year.
Thank you for using avast! Antivirus and recommending us to your friends and family. For all the latest news, fun and contest information, please follow us on Facebook, Twitter and Google+. Business owners – check out our business products.
For seven years, the CARO Workshop has been hosted in Europe. It is an outstanding technical meeting, attended by some of the best malware researchers in the world. In 2014, the CARO workshop comes to America. ~CARO’s conference official website
We are proud and happy to introduce you to our AVAST speakers and Security Experts from the Virus Lab. Peter Kálnai and Filip Chytrý are going to CARO’s (Computer Antivirus Research Organization) workshop to“Declare war against Android Malware.” We sat together and talked about their presentation, mobile malware, and general trends in the security industry.
Meet our security experts: Peter and Filip.
The theme for this year’s CARO conference is Mobile Space: Malware in a mobile world. As security experts, what changes and specific trends in malware development have you observed?
FILIP Well, this may sound cliché, but the amount of mobile threats are rising and more sophisticated attacks appear every day. A few years ago, we would observe mostly primitive malware with only one or two capabilities such as to send paid SMS or track your movements. Now, however we have malware that can root your phone and became a device administrator, or command and control Apps which take control of your device by attackers. That’s why I believe we can stay tuned for more conferences concentrated on Android malware. CARO is first, but hopefully not the last, conference focused on Android and mobile threats.
PETER I can’t recollect a different example, but this year’s CARO Workshop seems to be the first IT security conference completely devoted to mobile malware. The topic of our talk reflects trends in the Android threat landscape. Security experts nowadays observe an increased ratio of total malicious Android packages to unique malware families. Two particular cases appear most: The expansion of usage of Android packers and repackaging benign application with malicious code, so called piggybacking. Read more…