Avast Wi-Fi Finder’s Offline Mode helps you find hotspots without an Internet connection.
It’s never a pleasant experience to find yourself roaming around a foreign city unable to find Wi-Fi hotspots, especially when you’re unable to use your own data plan to begin with. In these cases, wouldn’t it be great to have a tool that could simply work its magic and locate nearby hotspots?
WhatsApp’s new end-to-end encryption means that the only people who can read your messages are you and the person that you’re chatting with.
Last night, I was chatting with a friend from home via WhatsApp, when a message appeared within my chat informing me that my messages and calls in WhatsApp were now secured with end-to-end encryption.
What is end-to-end encryption?
Think of encryption as a high-tech form of scrambled eggs — when you send messages, make a call, or send photos or videos with the latest version of WhatsApp, your messages are randomly mixed and secured. Only the person receiving your message has the key to unscramble your message so that it can be read. This makes it impossible for hackers, governments and even WhatsApp itself to access any of your messages. In the case that messages are intercepted by criminals or authorities, encryption renders messages unreadable to the unauthorized viewers.
Andromeda is one of the longest running and most prevalent malware families to have existed. Andromeda was first discovered in late 2011 and it probably evolved from ngrBot/DorkBot. Throughout its existence, the groups behind Andromeda have used various methods to spread the malware and infect users.
We have seen Andromeda spread via spam email campaigns with infected files attached (doc, xls, pdf, zip.), through illegal download sites, warez (infected cracks, keygens, ..), or infecting users via other phishing campaigns.
Infection vector
In recent months, the authors have mainly focused on spreading Andromeda via exploit kits (Neutrino, Nuclear, Angler,..) located on compromised websites or advertisement services. These exploit kits are mainly found on a dubious sites (p0rn, warez, video streaming sites, share sites etc.) but occasionally appear on trusted sites as well.
Ransomware has been a hot topic recently. The latest PC ransomware,Locky, made its rounds in late February andmultiple hospitals were infected with ransomware, which forced an online shutdown. Not only is ransomware continually attacking PCs, but this nasty form of malware is becoming increasingly more sophisticated and common in the mobile space as well.
Remember that bullying is never your fault, and it can happen to anyone. Bullying may make you feel embarrassed and like you’re all alone. But you’re not alone and it’s important to find someone who can help you through the situation. Reaching out to someone you trust. ~reminds Facebook
Facebook and other social channels are space for communication, sharing, and connecting with others. Unfortunately, it is also a space where cyberbullying takes place. Research provided by different organizations in the USA and UK shows scary numbers, and we are definitely witnesses of a new form of bullying on a massive scale. The psychological consequences can be very dramatic, therefore education is crucial for prevention and fighting this new phenomenon.
Read on to learn what to do if you or a friend is the victime of a cyberbully on Facebook.
Last summer, it was nearly impossible to avoid the news about the Stagefright vulnerability. At the time of its unveiling, security researchers believed Stagefright to be the worst Android vulnerability to be discovered. Nearly a year after its discovery, Metaphor is the most recent embodiment of the vulnerability to rear its ugly head.
Social engineering, a popular technique used to lure victims into becoming infected with malware, can also play a key role in encouraging victims to open web pages that allow the exploit to take place and for Metaphor to be fully effective.
Hackers use the popular jQuery library to inject malicious code into websites powered by WordPress and Joomla.
JQuery is a very popular JavaScript library. The basic aim of this library is to erase the differences between implementations of JavaScript in various web browsers. If you have ever tried web coding you know how tedious it can be to make the code do the same thing in different browsers. Sometimes it is a really big challenge. In such situations, this library can be very useful.
Of course it is only a matter of time until such a well-known library gets the attention of those who want to use it for different purposes other than web coding. Fake jQuery injections have been very popular among hackers. And that brings us to one of the most popular infections of the last couple of months – the attack that injects fake jQuery script into the head section of CML websites powered by WordPress and Joomla.
What does it look like?
The script is located right before the tag </head> so as a normal visitor you can’t notice anything unless you look into source code
“Connect with friends and the world around you on Facebook”
says the slogan of the social giant. Millions of Facebook users of different ages, nationalities, and genders share their daily life with family members and friends, and interact with brands. Among them there is a large group of teenagers who can be especially vulnerable target for cyber criminals. In this article I will help you make sure that Facebook is a safe place.
Avast SafeZone browser makes online shopping and banking more secure.
Avast has long provided an extra layer of defense called SafeZone Browser in our premium products. We are currently giving SafeZone to a select number of Avast Free Antivirus users so we can learn what they think of the browser.