Gracie Roberts

19 July 2016

Republican National Convention delegates unknowingly use fake Wi-Fi networks

More than 1,200 RNC attendees unknowingly connect to Avast’s bogus Wi-Fi hotspots outside the 2016 Republican National Convention.

RNC_fake_wifi_hotspots_phones.jpg

Read More

Mobile Security

Stefanie Smith

6 July 2016

Permission to punch the presidential candidates

The 2016 U.S. presidential primaries are well under way and the candidates are a hot topic in the media, social media and in real life discussions. With all the buzz, I was curious to see how Android app developers are taking advantage of the candidate’s popularity and what permissions the apps request.  So with this mission in mind, I started downloading and testing these apps.

Trump Apps – Permission Heavy

When I searched for “Trump” in Google’s Play Store, I wasn’t really too surprised to see a lot of silly apps. Mr. Trump has a certain reputation, and it seems like app developers are taking advantage of that.

Here are the top apps that appear when you search for “Trump” in the Play Store:

Top_Trump_apps_Play_Store.png

Read More

Mobile Security

Deborah Salmi

15 June 2016

Four things to do before you go on vacation

Here’s a plan to keep your mobile phone and PC safe when you’re on the road.

prepare_your_devices_for_vacation.jpg

Preparing for a summer trip used to be pretty simple. The biggest challenge was remembering

Read More

Mobile Security

Gracie Roberts

16 May 2016

New feature in Avast Passwords for Android: Fingerprint scanning

Screenshot_20160510-163038.png Screenshot_20160510-163229.png

Avast Passwords gives you easy, secure access to all your passwords, PINs and login credentials.

 Avast Passwords is an app that helps you to safely store each of your PIN codes, passwords and login details safely in one place. Instead of needing to memorize each of your login credentials, Avast Passwords allows you to keep them together in one secure place and access them safely.

Start managing your passwords now!  

Read More

Mobile Security

Gracie Roberts

28 April 2016

Free up space you didn’t know you had with Avast Cleanup

 

Avast Cleanup is our highly effective cache and junk cleaner app for Android. It optimizes your phone's performance and boosts its speed by removing unused junk from your mobile. 

611_Detail_MF.png 100_Safe_clean.png 400_More.png


Read More

Mobile Security

Gracie Roberts

26 April 2016

Avast Battery Saver makes the most of your phone’s battery by stopping unused apps and optimizing device settings

 Untitled-2_0004_5651_android_EN_a.png Untitled-2_0001_5651_android_EN_d.png Untitled-2_0002_5651_android_EN_c.png

Stop apps with one tap, speed up your device and save battery life with Avast Battery Saver.

You spoke and we listened! The all-new Avast Battery Saver 2.0 is here and includes a collection of exciting new features. Along with its fresh-faced design, the latest version of Avast Battery Saver is easy to use and more powerful than ever.

Read More

Mobile Security

Gracie Roberts

7 April 2016

New feature in Avast Wi-Fi Finder: Offline Mode

Dollarphotoclub_91770694.jpg

Avast Wi-Fi Finder's Offline Mode helps you find hotspots without an Internet connection.

It’s never a pleasant experience to find yourself roaming around a foreign city unable to find Wi-Fi hotspots, especially when you’re unable to use your own data plan to begin with. In these cases, wouldn’t it be great to have a tool that could simply work its magic and locate nearby hotspots?

Read More

Mobile Security

Stefanie Smith

6 April 2016

What WhatsApp’s new end-to-end encryption means for you

WhatsApp’s new end-to-end encryption means that the only people who can read your messages are you and the person that you’re chatting with.

Last night, I was chatting with a friend from home via WhatsApp, when a message appeared within my chat informing me that my messages and calls in WhatsApp were now secured with end-to-end encryption.

WhatsApp_encryption.jpg

What is end-to-end encryption?

Think of encryption as a high-tech form of scrambled eggs -- when you send messages, make a call, or send photos or videos with the latest version of WhatsApp, your messages are randomly mixed and secured. Only the person receiving your message has the key to unscramble your message so that it can be read. This makes it impossible for hackers, governments and even WhatsApp itself to access any of your messages. In the case that messages are intercepted by criminals or authorities, encryption renders messages unreadable to the unauthorized viewers.

Read More

Mobile Security, Security News

Stefanie Smith

5 April 2016

The evolution of mobile ransomware

Ransomware has been a hot topic recently. The latest PC ransomware, Locky, made its rounds in late February and multiple hospitals were infected with ransomware, which forced an online shutdown. Not only is ransomware continually attacking PCs, but this nasty form of malware is becoming increasingly more sophisticated and common in the mobile space as well.

What is ransomware?

Ransomware is a type of malware that locks a device or encrypts the data on it and then demands a ransom payment to unlock the device or to decrypt the data.

RaFBI_ransomware_warning.pngnsomware is typically spread using social engineering tactics, meaning that people are tricked into downloading it. In social engineering schemes, victims think they are downloading innocent content or a crucial service, such as antivirus software or a bill they need to pay, when they are really downloading ransomware. Once downloaded, ransomware displays a fake message accusing the user of illegal activity (downloading illegal porn or something similar).  -- The ransomware then encrypts files or locks the device and demands a ransom payment to unencrypt the files or to unlock the device. Once a payment is made, often with Bitcoins via Tor, the ransomware communicates with a C&C (command and control) server, which then sends the victim the decryption key.

Ransomware boomed because it has an immediate effect on the infected user's psychology. Fear and anxiety are two main emotions that criminals can evoke to get their victims to pay ransom,” said Nikolaos Chrysaidos, mobile malware analyst at Avast. “Social engineering plays a significant role in developing fear. Images and text can lead the victim into believing they are being accused of performing illegal activities. Anxiety can be caused by countdown timers that limit the time the victim has to pay the ransom and decrypt the device or files.”

Read More

Mobile Security, Security News

Nikolaos Chrysaidos

31 March 2016

Metaphor exploit: A follow-up to Stagefright that puts millions of Android devices at risk

Android-StageFright-Exploit

(Image via Enterprise Security Today)

Last summer, it was nearly impossible to avoid the news about the Stagefright vulnerability. At the time of its unveiling, security researchers believed Stagefright to be the worst Android vulnerability to be discovered. Nearly a year after its discovery, Metaphor is the most recent embodiment of the vulnerability to rear its ugly head.

Social engineering, a popular technique used to lure victims into becoming infected with malware, plays a key role in encouraging victims to open web pages that allow the exploit to take place and for Metaphor to be fully effective.

Read More

Mobile Security