Partner or perish: Why SMBs need MSPs

At the same time the cybersecurity threatscape is getting scarier, SMBs face even greater pressures with more risks and less resources.

16 Mar 2017 min read

Avast at Machine Learning Prague 2017

Avast technology is part of the next-gen artificial intelligence revolution.

16 Mar 2017 min read

Mac FindZip ransomware decryption tool unzips your encrypted files

Avast introduces a new decryption tool that will help Mac users infected with the FindZip ransomware decrypt their files.

13 Mar 2017 min read

Cloudy with a chance of malware

The Cloud - private, public and/or hybrid - has many benefits, but security will continue to be an ongoing challenge.

9 Mar 2017 min read

Don’t be an IRS phone scam's next victim. Start tax season safe.

Every day between now and April 15 is high season for IRS phone scams. You can block unwanted calls and protect yourself from both annoyance and theft.

9 Mar 2017 min read

Secure Wi-Fi is important. But secure IoT is vital.

Using only secure Wi-Fi hotspots will keep you safe. Right? Not in the Internet of Things era, when every device connected to those networks introduces risk.

7 Mar 2017 min read

Protecting real trust and truth in a virtual world

It's easy to find any viewpoint on the web. The problem is that often we have no idea who is producing this information or the motivations behind it.

6 Mar 2017 min read

Avast Free Mobile Security scores 100% in the latest AV Comparatives mobile test

Avast Mobile Security received 100% in the latest test run by AV-Comparatives on mobile AV products.

3 Mar 2017 min read

A cybersecurity primer

Cybersecurity is a moving target, and security processes, practices, hardware and software must evolve with the technologies, applications and threats.

2 Mar 2017 min read

Mobile World Congress 2017: Avast CEO demonstrates security threats targeting IoT devices

Avast’s Vince Steckler showcased IoT threats and spoke about the importance of securing devices to protect consumers at GSMA’s Enabling IoT Security conference.

1 Mar 2017 min read

Detection: What you don’t know will hurt you

Detection, the second of the three keys to effective cybersecurity, is essential to identifying existing weaknesses and breaches and having them resolved.

27 Feb 2017 min read

IoT weaknesses put webcams at risk for attack [infographic]

Cybercrooks could easily watch people in private and public spaces via webcams, stream the video directly to the internet, or turn the device into a bot.

27 Feb 2017 min read

Find out if your home network is vulnerable with Wi-Fi Inspector

Wi-Fi Inspector automatically scans your home network for vulnerable devices and helps address any security issues with step-by-step instructions.

24 Feb 2017 min read
--> -->