Sections

Threat Research

Major vulnerability found in ES File Explorer

The program developer has issued a fix, and users should update immediately.

30 January 2019 min read

2019 predictions: The internet of (vulnerable) things

perex__ Avast experts walk you through next year’s most menacing IoT threats in part 1 of our 2019 predictions.

Avast experts walk you through next year’s most menacing IoT threats in part 1 of our 2019 predictions.

7 January 2019 min read

Cartoon chaos on Facebook

perex__ Newly-discovered exploit designed to spread spam at scale targets Facebook users.

Newly-discovered exploit designed to spread spam at scale targets Facebook users.

20 December 2018 min read

Let’s play Hide ’N Seek with a botnet.

perex__ Hide ‘N Seek botnet continues infecting devices with default credentials, building a P2P network and more.

Hide ‘N Seek botnet continues infecting devices with default credentials, building a P2P network and more.

4 December 2018 min read

Advances in visual phishing detection

perex__ {value=Protect yourself from phishing scams with these best practices and our improved phishing detection AI. , redirectUrl=https://app.hubspot.com/blog/486579/edit-beta/6464934422}

Protect yourself from phishing scams with these best practices and our improved phishing detection AI.

27 November 2018 min read

Seven new Mirai variants and the aspiring cybercriminal behind them

perex__ {value=Two years after Mirai, botnets have become the playthings of script kids }

Two years after Mirai, botnets have become the playthings of script kids

25 October 2018 min read

Click
Confidently

Keeping the
world safe from
cyberattacks

Learn more

Ad network scams

perex__ Avast Threat Labs finds Android device firmware that reroutes ad network revenue to unknown accounts.

Avast Threat Labs finds Android device firmware that reroutes ad network revenue to unknown accounts.

24 October 2018 min read

MikroTik mayhem: Cryptomining campaign abusing routers

perex__ Computing power of computers, smartphones and smart TVs connected to vulnerable routers abused to mine cryptocurrency

Computing power of computers, smartphones and smart TVs connected to vulnerable routers abused to mine cryptocurrency

18 October 2018 min read

Block puzzles open the door to malware

perex__ Several block puzzle games in the Google Play Store now come with a side of malware.

Several block puzzle games in the Google Play Store now come with a side of malware.

9 October 2018 min read

Ransomware attacks via RDP choke SMBs

perex__ Protect yourself and your business from this troubling new trend.

Protect yourself and your business from this troubling new trend.

2 October 2018 min read

Torii botnet - Not another Mirai variant

perex__ New, more sophisticated IoT botnet targets a wide range of devices

New, more sophisticated IoT botnet targets a wide range of devices

27 September 2018 min read

Are smart homes vulnerable to hacking?

perex__ Avast expert Martin Hron tells you what you need to know about the strengths and weaknesses of IoT security and the MQTT protocol that connects and controls them.

Avast expert Martin Hron tells you what you need to know about the strengths and weaknesses of IoT security and the MQTT protocol that connects and controls them.

16 August 2018 min read