Category Archives: Avast

Avast

Avast SafeZone browser: A secure alternative to standard browsers

There are more ways to get to the Internet than the standard web browser. Most people go with one they have heard of or the one that comes with their PC. Google Chrome, Mozilla Firefox, Internet Explorer, and Opera are common names, but there are plenty of alternative browsers available. Since we are concerned about protecting your digital life in all areas, our developers created Avast SafeZone browser. It’s a fully functioning browser for those of us who want to ensure we have the optimal privacy and data security. 

Is WhatsApp safe to use or does it have a backdoor?

Last week an article from The Guardian stated that a backdoor within the end-to-end encryption of popular messaging app WhatsApp could be used by governments to snoop on users. The author “warned it could be used by government agencies as a backdoor to snoop on users who believe their messages to be secure.” This caused quite a stir in security circles, which resulted in a group of cryptography and security experts calling for a retraction and an apology for misleading claims.

Cybersecurity threatscape: Bigger and badder than ever

The reason cybersecurity is a process, not a one-time solution, is that the Bad Guys – whether careless or malicious employees, hacktivists, cybercriminals, or rogue governments (not to be confused with the good governments, which only spy on us for our benefit) – are a problem that will never go away. Every new and improved security measure is only as good as the people who use it and only effective until somebody comes up with a way to beat it.

Shadow IT and "No" versus "Know"

In an information-based economy where bring-your-own devices (BYOD) and, increasingly, bring-your-own applications (BYOA), are the norm, IT groups are struggling to enable their organizations to be fast and flexible while protecting their digital assets. Shadow IT,  also  referred to as rogue or cockroach IT, emcompasses the devices, software, and services outside the ownership or control of IT groups. While Shadow IT poses a significant threat to the management and security of organizations, it can also be a source of speed, agility, and freedom to enable business success.

How to protect your Android device from Ghost Push

Ghost Push is a malware family that exploits vulnerabilities to gain root access to Android devices to then download and review other apps in the background. Using social engineering, users are tricked into downloading Ghost Push from third party app stores or via links sent in text messages. Once installed, Ghost Push tries to gain root access. As the name suggests, Ghost Push acts in a ghostly fashion once it has root access, meaning infected users don’t notice anything – everything happens in the background. Recently, a new variant of the Ghost Push malware, Gooligan, was detected spreading in the wild. The Gooligan variant steals email addresses and authentication tokens stored on the infected devices, gaining access to users’ Google account data, including Gmail and Google Play.  More than one million users’ Google Play accounts were affected.