Learn about our real-time threat protection at Mobile World Congress Americas (MWCA).
While spyware using the Telegram Bot API is limited, it's the first Android Trojan controlled via Telegram’s message-exchange protocol. Avast investigates.
Cybercriminals are using a copycat version of WannaCry ransomware to target Android users in China.
Mobile malware authors are once again trying to circumvent antivirus detections by using a sandbox.
Robocallers are intrusive and often illegal. Learn how to stop them.
Every day between now and April 15 is high season for IRS phone scams. You can block unwanted calls and protect yourself from both annoyance and theft.
Using only secure Wi-Fi hotspots will keep you safe. Right? Not in the Internet of Things era, when every device connected to those networks introduces risk.
The Avast Threat Intelligence Team explains Ghost Push and how you can protect yourself.
We take a look at which apps kill your smartphone's battery, fill up its storage to the brim, and hit your monthly data plan hard.