<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Blog | Avast EN</title>
    <link>https://blog.avast.com</link>
    <description>Avast security experts write about cybersecurity threats and share solutions and tips you can use to stay secure in the digital world.</description>
    <language>en-us</language>
    <pubDate>Thu, 18 Apr 2019 21:14:23 GMT</pubDate>
    <dc:date>2019-04-18T21:14:23Z</dc:date>
    <dc:language>en-us</dc:language>
    <item>
      <title>Facebook Imports Info Without User Consent | Avast</title>
      <link>https://blog.avast.com/facebook-imports-info-without-user-consent-avast</link>
      <description>&lt;p&gt;Before 2016, one of Facebook’s regular protocols was an option for users to verify their accounts using email passwords. Users were informed if they chose this option, all of their email contacts would be uploaded as well, which would let the users see which of their friends were already on Facebook. (The info was also used by Facebook to better target ads.) Even though Facebook claimed the email passwords were never stored, the practice of asking users to enter such sensitive info and pulling all their contact info did not sit well with many cybersecurity experts, and in May 2016 the company changed that feature.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;Before 2016, one of Facebook’s regular protocols was an option for users to verify their accounts using email passwords. Users were informed if they chose this option, all of their email contacts would be uploaded as well, which would let the users see which of their friends were already on Facebook. (The info was also used by Facebook to better target ads.) Even though Facebook claimed the email passwords were never stored, the practice of asking users to enter such sensitive info and pulling all their contact info did not sit well with many cybersecurity experts, and in May 2016 the company changed that feature.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=486579&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.avast.com%2Ffacebook-imports-info-without-user-consent-avast&amp;amp;bu=https%253A%252F%252Fblog.avast.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>#privacy</category>
      <category>Security News</category>
      <category>#facebook</category>
      <pubDate>Thu, 18 Apr 2019 21:14:23 GMT</pubDate>
      <guid>https://blog.avast.com/facebook-imports-info-without-user-consent-avast</guid>
      <dc:date>2019-04-18T21:14:23Z</dc:date>
      <dc:creator>Avast Security News Team</dc:creator>
    </item>
    <item>
      <title>How Safe Is Budget-Tracking Software? | Avast</title>
      <link>https://blog.avast.com/how-safe-is-budget-tracking-software</link>
      <description>&lt;p&gt;These days, it seems like the next security breach is always lurking just around the corner. Whether it’s the latest Facebook &lt;a href="/540m-facebook-records-exposed-on-amazon-servers"&gt;password kerfuffle&lt;/a&gt; or a company’s credit card database being &lt;a href="/planet-hollywood-owner-hit-by-data-breach"&gt;breached&lt;/a&gt;, news stories of innocent people’s data being exposed abound. That’s why it’s best practice to guard your personal — and especially, financial — information very carefully. But what if you’re one of the millions of people out there who could use a little help sticking to a budget?&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;These days, it seems like the next security breach is always lurking just around the corner. Whether it’s the latest Facebook &lt;a href="/540m-facebook-records-exposed-on-amazon-servers"&gt;password kerfuffle&lt;/a&gt; or a company’s credit card database being &lt;a href="/planet-hollywood-owner-hit-by-data-breach"&gt;breached&lt;/a&gt;, news stories of innocent people’s data being exposed abound. That’s why it’s best practice to guard your personal — and especially, financial — information very carefully. But what if you’re one of the millions of people out there who could use a little help sticking to a budget?&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=486579&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.avast.com%2Fhow-safe-is-budget-tracking-software&amp;amp;bu=https%253A%252F%252Fblog.avast.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Tips &amp; Advice</category>
      <category>#privacy</category>
      <pubDate>Wed, 17 Apr 2019 22:02:46 GMT</pubDate>
      <author>charlotte.empey@avast.com (Charlotte Empey)</author>
      <guid>https://blog.avast.com/how-safe-is-budget-tracking-software</guid>
      <dc:date>2019-04-17T22:02:46Z</dc:date>
    </item>
    <item>
      <title>Avast Secure Browser Updates to Aspen | Avast</title>
      <link>https://blog.avast.com/avast-secure-browser-updates-to-aspen</link>
      <description>&lt;p&gt;How often do you sit at your computer without a browser window open? If you’re like us, the answer is never. If we’re on our machines, there is always at least one window open to the wilds of the internet. That’s why we created &lt;a href="https://blog.avast.com/take-back-control-of-your-privacy-with-avast-secure-browser-avast"&gt;&lt;strong&gt;Avast Secure Browser&lt;/strong&gt;&lt;/a&gt; —&amp;nbsp;we realized it would be a good idea to frontload that window to the internet with tools to protect your privacy, strengthen your security, and – because we just couldn’t help ourselves – amp up your speed.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;How often do you sit at your computer without a browser window open? If you’re like us, the answer is never. If we’re on our machines, there is always at least one window open to the wilds of the internet. That’s why we created &lt;a href="https://blog.avast.com/take-back-control-of-your-privacy-with-avast-secure-browser-avast"&gt;&lt;strong&gt;Avast Secure Browser&lt;/strong&gt;&lt;/a&gt; —&amp;nbsp;we realized it would be a good idea to frontload that window to the internet with tools to protect your privacy, strengthen your security, and – because we just couldn’t help ourselves – amp up your speed.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=486579&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.avast.com%2Favast-secure-browser-updates-to-aspen&amp;amp;bu=https%253A%252F%252Fblog.avast.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>#privacy</category>
      <category>Avast News</category>
      <category>#browser</category>
      <pubDate>Tue, 16 Apr 2019 08:00:00 GMT</pubDate>
      <author>avastblog@avast.com (Sander van Hezik)</author>
      <guid>https://blog.avast.com/avast-secure-browser-updates-to-aspen</guid>
      <dc:date>2019-04-16T08:00:00Z</dc:date>
    </item>
    <item>
      <title>Social Engineering Hacks the Way You Think | Avast</title>
      <link>https://blog.avast.com/social-engineering-hacks</link>
      <description>&lt;h2&gt;What does “social engineering” mean?&lt;/h2&gt; 
&lt;p&gt;The term “social engineering” may sound arcane and intimidating, and in some ways, it is. But most of us have encountered some form of social engineering many times — on the internet, in our emails, and in newspapers and magazines. The email advance-fee scam, which most of us will remember as the Nigerian Prince email scams from years ago, is one form of social engineering — deceiving the victim into believing they have something to gain.&lt;/p&gt;</description>
      <content:encoded>&lt;h2&gt;What does “social engineering” mean?&lt;/h2&gt; 
&lt;p&gt;The term “social engineering” may sound arcane and intimidating, and in some ways, it is. But most of us have encountered some form of social engineering many times — on the internet, in our emails, and in newspapers and magazines. The email advance-fee scam, which most of us will remember as the Nigerian Prince email scams from years ago, is one form of social engineering — deceiving the victim into believing they have something to gain.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=486579&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.avast.com%2Fsocial-engineering-hacks&amp;amp;bu=https%253A%252F%252Fblog.avast.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Viewpoints</category>
      <category>#phishing</category>
      <category>#viewpoint</category>
      <pubDate>Sun, 14 Apr 2019 13:00:00 GMT</pubDate>
      <author>avastblog@avast.com (Kevin Townsend)</author>
      <guid>https://blog.avast.com/social-engineering-hacks</guid>
      <dc:date>2019-04-14T13:00:00Z</dc:date>
    </item>
    <item>
      <title>WP3 Flaws Allow Password Stealing | Avast</title>
      <link>https://blog.avast.com/wp3-flaws-allow-password-stealing</link>
      <description>&lt;p&gt;The Wi-Fi Alliance’s next-generation Wi-Fi security standard, WPA3, has shown design flaws that could allow cyberattackers to recover Wi-Fi passwords and steal sensitive information.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;The Wi-Fi Alliance’s next-generation Wi-Fi security standard, WPA3, has shown design flaws that could allow cyberattackers to recover Wi-Fi passwords and steal sensitive information.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=486579&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.avast.com%2Fwp3-flaws-allow-password-stealing&amp;amp;bu=https%253A%252F%252Fblog.avast.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>#privacy</category>
      <category>Security News</category>
      <category>#wi-fi</category>
      <pubDate>Fri, 12 Apr 2019 16:04:53 GMT</pubDate>
      <guid>https://blog.avast.com/wp3-flaws-allow-password-stealing</guid>
      <dc:date>2019-04-12T16:04:53Z</dc:date>
      <dc:creator>Avast Security News Team</dc:creator>
    </item>
    <item>
      <title>New Malware TajMahal is Scary &amp; Sophisticated | Avast</title>
      <link>https://blog.avast.com/new-malware-tajmahal-is-scary-sophisticated</link>
      <description>&lt;h2&gt;&lt;strong&gt;TajMahal packs a palace of hurt&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Cybersecurity &lt;a href="https://www.zdnet.com/article/tajmahal-cyber-espionage-campaign-uses-previously-unseen-malicious-tools/"&gt;experts are calling attention&lt;/a&gt; to what appears to be spyware on steroids. The &lt;i&gt;TajMahal&lt;/i&gt; malware has been around since 2013 but was not discovered until late 2018. It is completely unique in that it has no known association with any advanced persistent threats (APTs) or malware. Its code is unlike others, and it uses an update mechanism to keeps its malware fresh so it avoids detection. Researchers are both impressed and unnerved by the level of sophistication in the malware, which includes malicious acts previously unseen such as stealing documents that had been sent to the printer queue, stealing files that had been accessed on removable drives, stealing data that had been burned on a CD, and taking screenshots as it records audio. The malware gives the attacker an all-access backdoor from which he or she can execute commands, use keylogging, exfiltrate files, steal cryptography keys, steal browser cookies, and more. All told, there are about 80 malicious acts that can be executed with &lt;i&gt;TajMahal&lt;/i&gt;.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;h2&gt;&lt;strong&gt;TajMahal packs a palace of hurt&lt;/strong&gt;&lt;/h2&gt; 
&lt;p&gt;Cybersecurity &lt;a href="https://www.zdnet.com/article/tajmahal-cyber-espionage-campaign-uses-previously-unseen-malicious-tools/"&gt;experts are calling attention&lt;/a&gt; to what appears to be spyware on steroids. The &lt;i&gt;TajMahal&lt;/i&gt; malware has been around since 2013 but was not discovered until late 2018. It is completely unique in that it has no known association with any advanced persistent threats (APTs) or malware. Its code is unlike others, and it uses an update mechanism to keeps its malware fresh so it avoids detection. Researchers are both impressed and unnerved by the level of sophistication in the malware, which includes malicious acts previously unseen such as stealing documents that had been sent to the printer queue, stealing files that had been accessed on removable drives, stealing data that had been burned on a CD, and taking screenshots as it records audio. The malware gives the attacker an all-access backdoor from which he or she can execute commands, use keylogging, exfiltrate files, steal cryptography keys, steal browser cookies, and more. All told, there are about 80 malicious acts that can be executed with &lt;i&gt;TajMahal&lt;/i&gt;.&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=486579&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.avast.com%2Fnew-malware-tajmahal-is-scary-sophisticated&amp;amp;bu=https%253A%252F%252Fblog.avast.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>#privacy</category>
      <category>Security News</category>
      <category>#cybercrime</category>
      <category>#malware</category>
      <pubDate>Fri, 12 Apr 2019 13:00:00 GMT</pubDate>
      <guid>https://blog.avast.com/new-malware-tajmahal-is-scary-sophisticated</guid>
      <dc:date>2019-04-12T13:00:00Z</dc:date>
      <dc:creator>Avast Security News Team</dc:creator>
    </item>
    <item>
      <title>Email Scam Threatens WannaCry &amp; DDoS Attack | Avast</title>
      <link>https://blog.avast.com/email-scam-threatens-ransomware-ddos-attack</link>
      <description>&lt;p&gt;As if tax season isn’t stressful enough, a new extortion email scam is currently underway to steal your personal details and commit fraudulent activities. Hackers are demanding two bitcoins from victims in exchange for keeping quiet about their presumed “tax evasion”.&amp;nbsp; If they do not pay, they will find themselves hit with a&amp;nbsp;&lt;a href="https://www.avast.com/c-ddos"&gt;DDoS attack&lt;/a&gt; and WannaCry ransomware.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;As if tax season isn’t stressful enough, a new extortion email scam is currently underway to steal your personal details and commit fraudulent activities. Hackers are demanding two bitcoins from victims in exchange for keeping quiet about their presumed “tax evasion”.&amp;nbsp; If they do not pay, they will find themselves hit with a&amp;nbsp;&lt;a href="https://www.avast.com/c-ddos"&gt;DDoS attack&lt;/a&gt; and WannaCry ransomware.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=486579&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.avast.com%2Femail-scam-threatens-ransomware-ddos-attack&amp;amp;bu=https%253A%252F%252Fblog.avast.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security News</category>
      <category>#ransomware</category>
      <category>#scam</category>
      <pubDate>Thu, 11 Apr 2019 16:47:34 GMT</pubDate>
      <guid>https://blog.avast.com/email-scam-threatens-ransomware-ddos-attack</guid>
      <dc:date>2019-04-11T16:47:34Z</dc:date>
      <dc:creator>Avast Security News Team</dc:creator>
    </item>
    <item>
      <title>Hidden Cameras at Your Airbnb? | Avast</title>
      <link>https://blog.avast.com/hidden-cameras-at-airbnb</link>
      <description>&lt;p&gt;The Barker family left New Zealand for a 14-month tour of Europe, scheduling a string of accommodations that included several Airbnb stays. Fortunately, Mr. Barker is an IT specialist and understands there are constant forces at work trying to hack into anything that is remotely hackable. Like old settlers would set a perimeter around their campsite for the night, Mr. Barker ran a routine Wi-Fi network scan of the house his family had rented. The scan detected a hidden camera live streaming his family’s stay.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;The Barker family left New Zealand for a 14-month tour of Europe, scheduling a string of accommodations that included several Airbnb stays. Fortunately, Mr. Barker is an IT specialist and understands there are constant forces at work trying to hack into anything that is remotely hackable. Like old settlers would set a perimeter around their campsite for the night, Mr. Barker ran a routine Wi-Fi network scan of the house his family had rented. The scan detected a hidden camera live streaming his family’s stay.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=486579&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.avast.com%2Fhidden-cameras-at-airbnb&amp;amp;bu=https%253A%252F%252Fblog.avast.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>#privacy</category>
      <category>Security News</category>
      <category>#wi-fi</category>
      <pubDate>Thu, 11 Apr 2019 16:22:50 GMT</pubDate>
      <guid>https://blog.avast.com/hidden-cameras-at-airbnb</guid>
      <dc:date>2019-04-11T16:22:50Z</dc:date>
      <dc:creator>Avast Security News Team</dc:creator>
    </item>
    <item>
      <title>Avast Cleanup Premium End of Support for XP | Avast</title>
      <link>https://blog.avast.com/avast-cleanup-windows-xp-end-of-life</link>
      <description>&lt;p&gt;In October 2001, Microsoft released one of the longest-running operating systems in history (as well as the now infamous “Bliss” wallpaper above) to the world: &lt;strong&gt;Windows XP&lt;/strong&gt;. In April 2014, Microsoft stopped supporting its ancient OS, and today — five years later — we need to do the same.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;In October 2001, Microsoft released one of the longest-running operating systems in history (as well as the now infamous “Bliss” wallpaper above) to the world: &lt;strong&gt;Windows XP&lt;/strong&gt;. In April 2014, Microsoft stopped supporting its ancient OS, and today — five years later — we need to do the same.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=486579&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.avast.com%2Favast-cleanup-windows-xp-end-of-life&amp;amp;bu=https%253A%252F%252Fblog.avast.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Avast News</category>
      <category>#windows</category>
      <category>#performance</category>
      <pubDate>Thu, 11 Apr 2019 07:01:00 GMT</pubDate>
      <author>avastblog@avast.com (Sandro Villinger)</author>
      <guid>https://blog.avast.com/avast-cleanup-windows-xp-end-of-life</guid>
      <dc:date>2019-04-11T07:01:00Z</dc:date>
    </item>
    <item>
      <title>How Safe is Your SMB From Web Threats? | Avast Business</title>
      <link>https://blog.avast.com/smb-web-threats</link>
      <description>&lt;p&gt;How safe is my business online? This question goes through our minds quite a bit as we click around our emails, scroll various web pages, and consent to cookies that track our data.&lt;/p&gt;</description>
      <content:encoded>&lt;p&gt;How safe is my business online? This question goes through our minds quite a bit as we click around our emails, scroll various web pages, and consent to cookies that track our data.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=486579&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fblog.avast.com%2Fsmb-web-threats&amp;amp;bu=https%253A%252F%252Fblog.avast.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Wed, 10 Apr 2019 13:00:00 GMT</pubDate>
      <author>avastblog@avast.com (Gill Langston)</author>
      <guid>https://blog.avast.com/smb-web-threats</guid>
      <dc:date>2019-04-10T13:00:00Z</dc:date>
    </item>
  </channel>
</rss>
