Sections

Threat Research

The 5 Vs of big data for machine learning

How Avast uses big data and machine learning to protect you

16 August 2017 min read

How AI outsmarts cybercriminals

Far from sci-fi depictions, artificial intelligence – through machine learning algorithms and big data – is key to defusing today's evolving cyberthreats.

15 June 2017 min read

Fighting the new wave of cybercrime

Defeating today’s – and tomorrow's – cybercriminals requires man and machine to collaborate, intelligently. This is the heart of next-gen cybersecurity.

8 June 2017 min read

New ATM fraud makes robbing a bank easier

Innovative and infamous bank fraud groups create new security challenges for banks.

23 March 2017 min read

IoT weaknesses put webcams at risk for attack [infographic]

Cybercrooks could easily watch people in private and public spaces via webcams, stream the video directly to the internet, or turn the device into a bot.

27 February 2017 min read

Misconfigured server reveals Cerber ransomware targets users in Europe, North America

Highly effective Cerber ransomware is spread via phishing emails and demands more than $700 in ransom  

13 January 2017 min read

Next-gen
cybersecurity for all

Learn more

A new Locky ransomware attack is coming

Based on analysis of past Locky ransomware attacks, experts in the Avast Threat Labs predict that another attack is imminent.

6 January 2017 min read

How malware and vulnerabilities get their names

You may have wondered where Cryptolocker or Heartbleed came from, and why. And does every virus and vulnerability get a name?

25 November 2016 min read

An in-depth look at the technology behind CyberCapture

Avast CTO and executive vice president Ondrej Vlcek explains CyberCapture's advanced malware detection methods used in every Avast product.

17 November 2016 min read

Investigation of regular high load on unused machines every 7 hours

Regular high load every 7 hours: Finding out how Linux measures load value.

8 November 2016 min read

Hucky ransomware: A Hungarian Locky wannabe

Avast Threat Labs has discovered a new Hungarian ransomware sample that is imitating Locky.

25 October 2016 min read

Malware posing as dual instance app steals users’ Twitter credentials

By installing a piece of newly discovered malware, you can download multiple instances of Twitter’s authentic application on your devices – at a price.

19 October 2016 min read
Load more articles (12)