Sections

Threat Research

The dark side of IoT devices

IoT devices offer so much convenience yet pose so much risk.

16 October 2017 min read

Ladies and Gentlemen, prepare your CPU—web browser mining is coming

Beware of websites with cryptominer embedded as it could impact your computer speed while you lend your CPU resources to help mine cryptocurrency

13 October 2017 min read

Avast Threat Labs analysis of CCleaner incident

Technical update and ongoing analysis of the APT security incident

21 September 2017 min read

The 5 Vs of big data for machine learning

How Avast uses big data and machine learning to protect you

16 August 2017 min read

How AI outsmarts cybercriminals

Far from sci-fi depictions, artificial intelligence – through machine learning algorithms and big data – is key to defusing today's evolving cyberthreats.

15 June 2017 min read

Fighting the new wave of cybercrime

Defeating today’s – and tomorrow's – cybercriminals requires man and machine to collaborate, intelligently. This is the heart of next-gen cybersecurity.

8 June 2017 min read

Next-gen
cybersecurity for all

Learn more

New ATM fraud makes robbing a bank easier

Innovative and infamous bank fraud groups create new security challenges for banks.

23 March 2017 min read

IoT weaknesses put webcams at risk for attack [infographic]

Cybercrooks could easily watch people in private and public spaces via webcams, stream the video directly to the internet, or turn the device into a bot.

27 February 2017 min read

Misconfigured server reveals Cerber ransomware targets users in Europe, North America

Highly effective Cerber ransomware is spread via phishing emails and demands more than $700 in ransom  

13 January 2017 min read

A new Locky ransomware attack is coming

Based on analysis of past Locky ransomware attacks, experts in the Avast Threat Labs predict that another attack is imminent.

6 January 2017 min read

How malware and vulnerabilities get their names

You may have wondered where Cryptolocker or Heartbleed came from, and why. And does every virus and vulnerability get a name?

25 November 2016 min read

An in-depth look at the technology behind CyberCapture

Avast CTO and executive vice president Ondrej Vlcek explains CyberCapture's advanced malware detection methods used in every Avast product.

17 November 2016 min read
Load more articles (12)