BYOD: Untrusted at best, compromised at worst

In an increasingly mobile-first world where most devices are personal, you must be the first line of defense protecting critical data from loss or theft.

13 Feb 2017 min read

The core security components of Avast 2017

We face many cybersecurity challenges ahead, but Avast is ready to confront them head on with our most powerful protection yet.

10 Feb 2017 min read

Avast 2017 protects you from ransomware and other cyber threats

Avast 2017 is designed to combat today’s most prevalent threats such as ransomware and unsecured IoT home devices.

7 Feb 2017 min read

When are kids ready for digital independence?

Most teens want their own smartphone, but parents can have a hard time knowing when kids can handle the responsibility.

7 Feb 2017 min read

Avast SafeZone browser: A secure alternative to standard browsers

Protect your data and privacy when you’re using the Internet with our improved Avast SafeZone browser.

7 Feb 2017 min read

Avast sponsors Virtual GP motorsports team

Gentlemen, start your engines! Avast enters the world of virtual F1 with a new motorsports team.

3 Feb 2017 min read

Avast releases 3 more free decryption tools for ransomware victims

Avast now offers ransomware victims 14 free decryption tools to help them get their files back.

2 Feb 2017 min read

Ransomware attacks hotel computer and keycard system

Ransomware attack on hotel holds computer system hostage making reservation and electronic key inaccessible.

1 Feb 2017 min read

Is WhatsApp safe to use, or does it have a backdoor?

News that WhatsApp has a backdoor that governments could use to intercept messages angers crypto experts and confuses users.

1 Feb 2017 min read

‘Clash of Clans’ Supercell forum hacked

Hackers break into out-of-date software and steal user email addresses, passwords, and other data to sell on the Darknet.

24 Jan 2017 min read

Cybersecurity threatscape: Bigger and badder than ever

The Bad Guys, including malicious and careless insiders, continue to raise the cybersecurity stakes with existing and emerging threats.

23 Jan 2017 min read

Shadow IT and 'No' versus 'Know'

Shadow IT has the potential to transform IT from 'too little, too late' to 'business enablement.'

18 Jan 2017 min read

How to protect your Android device from Ghost Push

The Avast Threat Intelligence Team explains Ghost Push and how you can protect yourself.

17 Jan 2017 min read
--> -->