Avast Home Network Security scans routers to reveal weaknesses

Thousands of Telekom customers in Germany have been knocked offline due to a cyber attack targeting routers.

30 Nov 2016 min read

Consumers and businesses still need antivirus software

Despite advances in OS and browser security, antivirus software is still the best defense against cybercriminals who exploit computers and mobile devices.

30 Nov 2016 min read

Popular call blocking apps expose 3 billion users' phone numbers

The mobile phone numbers of politicians, celebrities, and billions of others are available on public databases from popular Caller ID and blocking apps.

25 Nov 2016 min read

How malware and vulnerabilities get their names

You may have wondered where Cryptolocker or Heartbleed came from, and why. And does every virus and vulnerability get a name?

25 Nov 2016 min read

Showrooming this shopping season? Protect yourself with a VPN.

This shopping season protect yourself with a VPN when using public Wi-Fi hotspots.

24 Nov 2016 min read

Block unwanted calls on your iPhone

New Avast Call Blocker app blocks telemarketing and unsolicited phone calls from your iPhone.

23 Nov 2016 min read

Kevin Chapman joins as new SMB General Manager

Kevin Chapman, Avast's new GM of our SMB business unit, will drive results for our Avast business customers and channel partners.

22 Nov 2016 min read

Your Android could be sending messages to China

A pre-installed backdoor on more than 700 Android devices transmits data to a server in China every 72 hours.

18 Nov 2016 min read

An in-depth look at the technology behind CyberCapture

Avast CTO and executive vice president Ondrej Vlcek explains CyberCapture's advanced malware detection methods used in every Avast product.

17 Nov 2016 min read

Tips to stay safe while shopping online this holiday season

Shopping online is one of the reasons why we love the internet. Keep your online shopping safe and private with our safe shopping tips.

17 Nov 2016 min read

A new era for politics and information security

The one irrefutable lesson from Hillary Clinton’s defeat is that modern systems require modern security measures.

11 Nov 2016 min read

Investigation of regular high load on unused machines every 7 hours

Regular high load every 7 hours: Finding out how Linux measures load value.

8 Nov 2016 min read

Hacking an election is more than breaking in to a machine

Since any digital system can be hacked, the assumption has to be that electronic voting in US elections is already compromised.

2 Nov 2016 min read
--> -->