Hide ‘N Seek botnet continues infecting devices with default credentials, building a P2P network and more.
Protect yourself from phishing scams with these best practices and our improved phishing detection AI.
Two years after Mirai, botnets have become the playthings of script kids
Computing power of computers, smartphones and smart TVs connected to vulnerable routers abused to mine cryptocurrency
Protect yourself and your business from this troubling new trend.
New, more sophisticated IoT botnet targets a wide range of devices
Avast expert Martin Hron tells you what you need to know about the strengths and weaknesses of IoT security and the MQTT protocol that connects and controls them.
The evolution of Avast Evo-Gen: Using machine learning to protect hundreds of millions of users
Why patching especially matters in a post Meltdown and Spectre world.