Category Archives: Avast

Avast

Kevin Chapman joins as new SMB General Manager

Kevin_Chapman.jpgToday, I am pleased to announce that Kevin Chapman has joined our team as Avast’s new General Manager of our SMB business unit.  I have known Kevin for years, and I am very glad he is joining us.

In this role, Kevin will lead all aspects of our SMB business, including our go-to-market strategy, product management, marketing, sales and support. Kevin joins us with a long background in security as well as great experience working with the channel having spent many years in senior roles at Symantec.  He brings a track record building SMB operations and leading global teams.

A new era for politics and information security

USelection.jpg

Tuesday’s election defied virtually all expert opinion confidently put forth on traditional media channels. As many pundits have since accurately, albeit belatedly, noted, the outcome was a complete rejection of the country’s political establishment. More than that, it was a repudiation of the centralized, elite-driven information network that wrongly believed it still held a monopoly on public opinion. The result of this year’s presidential election is a stark indicator that the dominance of newspapers and cable television has passed, and that the new barometer of the public mood is social media—which Donald Trump understood better than any of the analysts and commentators who predicted his defeat.

Investigation of regular high load on unused machines every 7 hours

We recently decided to make our DNS infrastructure inside each of our core data centers more robust and therefore installed three virtual servers on three different hypervisors to function as DC-local recursive DNS servers. We chose an unbound DNS recursive resolver for this task, as we had positive experience with it from the past and we already had collectd scripts for its performance monitoring, as well as the necessary puppet modules.

Hucky Ransomware: A Hungarian Locky Wannabe

At Avast Threat Labs, we are constantly monitoring the threat landscape and evaluating current risks. Most of the time, we face prevalent strains of malware, such as Locky or Cerber ransomware, but from time to time we are alerted by our automated systems about anomalies within active in-the-wild samples. These alerts are either new techniques used by known malware or a discovery of a new strain.