Today’s biggest threat to the normal consumer is the consumer themselves.
This bold statement was made by Avast CEO Vincent Steckler in an interview with German technology website Valuetech in Munich last week. That’s a daring position to take after this year’s revelations about NSA spying, the theft of tens of millions of customer passwords from major retailers like Target and Home Depot, the recent Sony Pictures hack, and the normal parade of Trojan horses, worms and viruses, but it’s one that Steckler stands behind.
Watch the interview here (04:00),
Mr. Steckler has good reason for his conclusion. Here’s a few of the main points he made during the interview.
Social engineering preys on human weakness
“A lot of attacks are still using social engineering techniques; phishing emails – ways of convincing the user to give up valuable information,” said Steckler.
An example of phishing emails just occurred after Black Friday, when cybercrooks sent millions of fake purchase confirmation emails to customers of major retailers. You can read about that, as well as what to do if you are a victim, in our blog, Fake confirmation emails from Walmart, Home Depot, others in circulation.
The Mac misconception
Mac users are well-known for proudly touting that they don’t use antivirus protection because they never have a problem with viruses. But, it’s really a numbers game.
“There is no fundamental difference,” Steckler says of the security of PCs and Macs. “Mac is not inherently any safer, as a technology, than Windows is. What makes a difference there is what is more opportune for a bad guy to attack.”
He explains that malware written for Windows can attack up to 93% of the world’s PCs. Mac malware only reaches 7-8% of the world’s PCs. The safety then lies in the lower numbers of Mac devices rather than a technical safety advantage.
Households networks are as complicated as small business networks
With the interconnectivity of household devices from household computers, mobile phones, TVs and even refrigerators, Steckler compares the typical household network to that of a small business.
“The central weakness in this ‘Internet of Things’ will be that home router – the thing that connects everything together,” says Steckler, “and basically doesn’t have any security on it.”
Avast 2015 seeks to address this lack in security by including the new Home Network Security scanner.
The path from the creation of malicious program to its delivery onto victims’ computers is long nowadays and involves many different players with the same goal – to make a financial gain. Malware authors usually offer their software to cyber criminals who in turn distribute it via underground forums. This is the how they keep their anonymous status. We have previously seen many famous malicious programs start this way.
In the past, the Russian banking Trojan Carberp was heavily advertised on shady forums. In the beginning of the year, an attempt to sell a new ransomware called Prison Locker was reported. Last year, we blogged about Trojan Solarbot which choose to promote itself through a well- designed website, appearing very official.
However, we don’t always know all the details about every piece of malware, from the code to how it is being distributed. The Trojan dubbed i2Ninja, for example, made headlines last year, but we never received a real sample containing all the functionalities the media reported on. Or do you remember the Hand of Thief Trojan for Linux desktops? Its variant for the Android platform was also advertised, but again, we never encountered it in our Virus Lab. These advertisements could have lacked the real code behind them or may have gone under in the pile of cyberthreats.
In March 2013 a new banking Trojan dubbed Minerva was introduced on a Russian forum. We will see that it is awfully successful in what it promised to do. Read more…
Yes, GrimeFighter will speed your old laptop up, and more than that. We are quite proud of avast! GrimeFighter and see it as a complement to the services provided by avast! Antivirus, so I’m glad you asked this question. Read what one of our customers told us after using GrimeFighter on her old laptop.
Here’s a summary followed by a short video on how to get GrimeFighter for your PC.
Why do I need GrimeFighter?
New PCs come pre-loaded with what we call Grime - all kinds of clutter and trialware. Over time your PC gets bloated with more Grime; viruses, spyware, pop-ups, and toolbars, making it sluggish and difficult to use. GrimeFighter comes to the rescue as an easy-to-use, and dare I say, even fun, fully-automated optimization tool designed so that even a novice can tune up his computer.
Don’t get put off by the word “optimization.” This isn’t those scammy products advertised on late-night television – AVAST wouldn’t be a part of such things. GrimeFighter is a product that we stand behind and believe will help our users extend the life of their machines. (Windows XP users, we’re talking to you!)
In recent weeks, malware samples resolved as Win32/64:Napolar from AVAST’s name pools generated a lot of hits within our file and network shields. Independently, we observed an advertising campaign of a new Trojan dubbed Solarbot that started around May 2013. This campaign did not run through shady hacking forums as we are used to, but instead it ran through a website indexed in the main search engines. The website is called http://solarbot.net and presents its offer with a professional looking design:
For the Win32/64:Napolar Trojan, the pipe used to inter-process communication is named \\.\pipe\napSolar. Together with the presence of character strings like “CHROME.DLL,” “OPERA.DLL,” “trusteer,” “data_inject,” and features we’ll mention later, we have almost no doubts that the Trojan and Solarbot coincide. Let us look at some analysis.
The top active members in one of our largest and most active communities, the AVAST forum, are called evangelists. These evangelists are technically skilled people who love to help and guide our users, free or paid, through the technology and security jungle. They try to keep things simple for all levels and in this blog, they want to share with you how to keep your Windows system running like new indefinitely. Isn’t it a dream of all of us? Let’s go!
A clean machine is a fast machine
- Keep your computer clean and vents unobstructed: If it overheats the performance decreases. If you haven’t looked at the bottom of your computer since you took it out of the box, chances are that the vents are filled with dust bunnies. Turn off your computer and carefully use your vacuum cleaner attachment to suck the dust out.
- Clean your disk of temporary files and defragment to help with your computer performance. We suggest CCleaner for both file and Windows Registry cleaning. It’s safe and removes registry entries left behind after simple uninstallation of programs. Windows has a built-in defragmenter and there are many other free ones on the internet.
- RAM (memory) is cheap nowadays and worth every cent you pay for the memory sticks, especially if you use memory-intensive programs like Photoshop or a video editor. Before you try to give your machine a faster, smoother ride, you need to know your hardware limits.
Multi-tasking slows you (and your machine) down
- Keep in mind that you do not need to multi-task all the time or, in other words, do not run many programs at the same time. For multi-tasking, split your work between your smartphone or tablet, for instance, listen to music, browse or read mail on your tablet while you work on an your laptop. Read more…