Tag Archives: General

The cat and mouse game of internet security

Virus Lab analysts can see real-time threats on the monitoring wall

Virus Lab analysts can see real-time threats on the monitoring wall

Security is an evolutionary business rather than a revolutionary one.

“Computer security has been around for 25 or 30 years and the threats keep evolving,” Avast CEO Vince Steckler in a video interview with ValueTech.

The solutions keep evolving too. “If you go back 20 years ago, the big issue was script kiddies and big public splashes of viruses that frankly didn’t cause any harm. These days, things are much more complicated. You don’t have big flaws, big loopholes for bad guys to take advantage of. What this turned into is a cat and mouse game.

Avast CEO Vince Steckler

Avast CEO Vince Steckler

Keeping up with the bad guys

To combat today’s cybercrooks, Avast Virus Lab analysts must study what the bad guys have done previously.

“You start trying to predict what the bad guys might be trying to take advantage of in the future and closing off those holes. At the same time, those guys are finding other little ways in and you have to catch up with them,” said Steckler.

Antivirus companies have done an excellent job at protecting the consumer and small business “endpoint” – such a good job that it’s actually very difficult to break into the endpoint itself. This forces cybercrooks to look for other entry points.

Avast experts agree that the likely path cybercrooks take is through the home router.

Home routers give cybercrooks an easy target

Consumer routers tend to be acquired based on price and they have a lot of flaws. Steckler estimates that, “We can break into probably about 70% of home routers in the world.”

The reason home routers are so vulnerable, he says, is that, “They are very poorly protected and the username-password on them is something that’s easy to crack. It’s not that difficult for someone to break in remotely over the Internet via the username and password or in a drive-by, in which case it’s even easier.” Most routers also have unpatched software leaving them with a number of vulnerabilities.

Recently the hacktivist group, Anonymous, launched a DDoS attack using compromised home routers so Steckler thinks that the frequency of those types of attacks will increase.

How to secure the Internet of Things,the Smart Home, and Industry 4.0

“The Internet of Things and 4.0 get a lot of press because they have nice catchy buzz words,” said Steckler. People have connected refrigerators, connected thermostats, door locks, security cameras, and baby cameras, but, “Right now a lot of internet-connected refrigerators don’t do anything. They are just a browsing tablet.”

“But when people start looking at what kind of protection is needed, you have to be thinking about what’s the risk. If my internet-connected refrigerator gets hacked, what happens? If my thermostat gets hacked, what happens?,” asked Steckler.

“The common thing with all of this is that none of these devices in the so-called Internet of Things really have any direct connection to the Internet. They are all connected, once again, through the home router,” said Steckler.

Since the home router is a vulnerable entry point that means that the risk for attack exists. “If you can harden your home router, that really goes a long way towards protecting the Internet of Things.

The risk of BYOD

“The Enterprise is a much different story, when you get into the BYOD (Bring Your Own Device). We all have mobile devices, and for many reasons it’s much more convenient to use one mobile device for both your personal and your business,” said Steckler.  “Some businesses encourage it by providing a device, but the fact of the matter is most everyone is going to be using one mobile device for both.”

That co-existence of personal and business-related data on one device that the employee is responsible for causes a risk to the consumer and the business. To the business it means that their data can be lost if access to the internal systems is compromised. If the employee loses the device, the typical company response will be to remotely wipe everything on it including all their personal stuff – then they suffer a big data loss.

“A solution is really to virtualize the entire corporate usage of it and run all the corporate usage on the corporate servers,” said Steckler. “That’s why we’ve brought out a new solution this year that does exactly that.”

Avast Virtual Mobile Platform (VMP) addresses these security risks, helping IT organizations liberate their businesses from leaks of confidential data and minimize mobile device costs.


Watch the entire interview including Mr. Steckler’s opinion about when Artificial Intelligence will become a threat to humanity and why Avast built a Silicon Valley-style building for its headquarters.

What you share online may be revealed to others

Every year we celebrate Data Privacy Day by thinking about what we post online, what methods we use to connect, and the security of the devices we use.

Data Privacy Day

Data Privacy Day  (DPD) is an international effort held annually on January 28 to create awareness about the importance of privacy and protecting personal information. Avast knows that security these days means more than protection against viruses. Online threats put your security and personal data at risk. You not only have to protect your desktop PC, but also your mobile devices. Your privacy can be violated by the apps you use, and bad guys can even invade your home through your home router.  

Fortunately, these threats can be managed when you take the advice of Data Privacy Day: 

STOP. THINK. CONNECT.

Here’s some tips and solutions from Avast to help you manage all the privacy needs on your devices.

Share with care

Think about the consequences of what you post online, especially in social networks. Think about what others could learn about you and who might see your posts in the future ‒ teachers, parents, colleges, and potential employers.

career ending

What you post can last a lifetime, so choose wisely what you share publicly.

 

Own your online presence: Set the privacy and security settings on web services and devices to your comfort level for information sharing. It’s ok to limit how and with whom you share information.

Want to view or change your privacy/security settings, but don’t know where to find them? Use the direct links gathered for DPD to update your privacy settings on popular devices and online services.

Stay CyberAware while on the go

Don’t count on public Wi-Fi networks and hotspots to be safe; anyone could potentially see what you are doing on your mobile device while you are connected. Avast Wi-Fi Finder locates safe and reliable connections in your area.

If no secured networks are to be found, then you can connect using Avast’s virtual private network (VPN) app called Avast SecureLine VPN. It encrypts your connect to prevent hackers from stealing your data via public/open Wi-Fi hotspot networks.

Personal information is like money. Value it. Protect it.

Protect your PC or Mac. Bank account numbers, passwords, photos, messages and emails – all of them need some form of protection to stay out of the wrong hands. One of the easiest steps to take is to get strong protection like Avast Antivirus. Avast does what you would expect – detects and blocks viruses and malware, but it has a unique feature called Home Network Security which strengthens your home network by scanning your home router for vulnerabilities.

Protect your mobile devices. Much of your life is on your mobile devices – banking information, private messages, and photos. Protect all your data with Avast Mobile Security, free from Google Play.

Protect your passwords. The best tip: Avoid using easy-to-crack passwords like 123456 or password. We know when you have an average of 19 passwords to remember that that advice can be a bit difficult. Avast Passwords  for PC, iOS, and Android automatically generates extremely strong passwords that you don’t have to struggle to remember! All you do is set and remember one master password to access all your passwords across your devices.

Data Privacy Day might be celebrated on January 28, but the principles need to be practiced everyday so you can make sure your privacy is protected around-the-clock. Here at Avast, we strive to give you the tools to do that. Please share these tips and Avast solutions with the important people in your life.

 

 

Avast for Business makes life easy for IT professionals

Businesses and organizations use Avast for Business, the security solution that’s easy to deploy and manage (and free!).

Business sectors such as education, retail, healthcare, IT consulting firms love and use Avast business security solutions for their ease-of-use and effectiveness against threats. In less than a year, more than one million devices have been secured by our cloud-managed security solution.  A reason for its success is because many businesses, schools, and other organizations lack the IT resources to install costly and complex security solutions.

At our recent Avast Grand Opening gala event, a team of Avastians demonstrated how even the most IT-challenged staff can easily deploy Avast for Business to manage PCs, Macs, and servers from a central console and easily set up different levels of protection.

Michal Trs and Martin Svoboda present Avast for Business at the Grand Opening gala event.

Michal Trs and Martin Svoboda present Avast for Business at the Grand Opening gala event.

Once the team had demonstrated how to deploy an account, they then showed what happens in the nightmare scenario of an infection running wild in a company network. In the simulation, a threat detection was emailed to the central console, where the team’s acting IT professional was able to view and manage potential threats on all employee devices protected by Avast for Business.

The best part? Everything from deploying the program to managing it on employee devices can be done from the comfort of an IT professional’s own office chair. Sign up for an Avast for Business account on on our website.


 

Follow Avast on FacebookTwitterYouTube, and Google+ where we keep you updated on cybersecurity news every day.

AV-TEST rates Avast Free Antivirus 2016 as a top security product for Windows Home Users

Avast Free Antivirus 2016 obtained highly positive ratings in AV-TEST's recent Product Review.

Avast Free Antivirus 2016 obtained highly positive ratings in AV-TEST’s recent Product Review.

AV-TEST, the leading and worldwide operating service provider for IT security testing services, has recently revealed the results of their Product Review and Certification Report for November-December 2015. AV-TEST describes the details of the review on their website:

. . .we continuously evaluated 20 home user security products using their default settings. We always used the most current publicly-available version of all products for the testing. They were allowed to update themselves at any time and query their in-the-cloud services. We focused on realistic test scenarios and challenged the products against real-world threats. Products had to demonstrate their capabilities using all components and protection layers.

 

Avast passes the AV-TEST Product Review with flying colors

Avast Free Antivirus 2016 obtained five out a maximum six points in performance and all six points in both protection and usability tests. In AV-TEST’s review, the product was tested on Windows 8.1 Professional (64 bit).

The performance test measures the average influence of the product on a computer’s speed in daily usage. The Protection test consists of real-world testing methods against zero-day malware attacks, inclusive of web and email threats. Lastly, the Usability test examines the impact of security software on the usability of a user’s entire computer.

Our website includes further information, as well as download links, to all Avast 2016 products. Check them out online.


Follow Avast on FacebookTwitterYouTube, and Google+ where we keep you updated on cybersecurity news every day.

Avast’s new Prague headquarters is set to attract the most talented people

Avast's new headquarters are located in Prague's Enterprise Office Center.

Avast’s new headquarters are located in Prague’s Enterprise Office Center.

The opening of Avast’s beautiful new headquarters, Prague’s Enterprise Office Building, is a pretty good cause for celebration. At last night’s Grand Opening event, a few of our executive team members shed light on the moving process, as well as specific details about the building and its potential to open new doors for the company. Avast COO Ondrej Vlcek described the initial concept behind the building:

We modeled the design after some very successful Silicon Valley companies and are bringing that entrepreneurial spirit and drive for excellence to the team.

The building has an impressive collection of features:

  • 45 meeting rooms that provide both formal and relaxed environments.
  • 6-meter-wide stairs thoughout all six floors that serve as a meeting spot for employees.
  • A canteen with free food served daily from the morning until late afternoon. This supports informal contact between groups that traditionally wouldn‘t have lunch together as well as increased cross-departmental communication.
  • A fitness area, hammock room, pool tables, cinema, and library for enrichment and relaxation.
  • A children‘s room that works to support (and lend a hand to) each of our working parents.

 

It’s not hard to believe that such a spectacular working space draws in top-notch talent from across the globe to work at Avast. Current Avast employees also have a lot of positive things to say about our new workspace:

When I saw our canteen, I couldn’t believe it. So many varieties of food, from healthy light salads to breakfasts of champions. — Tomas Penka (eComm Specialist)

It’s fresh and unique, and it provides an atmosphere that invites creativity. – Che Johnson (Corporate Tech Support)

The central staircase impels employees to make use of it and walk more, which has been a healthy surprise. – Petr Prusa (QA Engineer)

Moving into the new year, we’re looking forward to thriving in our new building and seizing the opportunity to demonstrate how we work to keep people around the world safe every day.


Follow Avast on FacebookTwitterYouTube, and Google+ where we keep you updated on cybersecurity news every day.

Avast opens its new headquarters with a gala event

Avast Building exterior

New Avast headquarters

Avast Software celebrates moving into a beautiful Silicon Valley-style work place.

The grand opening of the new Avast headquarters, held in Prague on Thursday night, was a gala event for employees, friends of Avast, international journalists, his excellence Andrew H. Schapiro U.S. Ambassador to the Czech Republic, Chairman of the Board John Schwarz, our two co-founders, and other honored guests.

Opening the event on a stage set up in the expansive lobby of the new building, CEO Vincent Steckler summarized his last 7 years with the company. When he started, Avast was still a start-up in many ways with only 3 products, 40 employees, and occupying a modest building. There was no board of directors or proper company structure in place.

Since Mr. Steckler took the helm of the company, Avast has become a global force in security software and delivered award-winning products to consumers, small businesses, and enterprise.

“We are extremely proud of how far we have come,” said Steckler. “Avast is on more computers than any other security software, and we are just getting started.”

Avast lobby

Guests gather in the lobby as the Avast Grand Opening begins

Looking towards the future, Steckler said to a rapt audience, “The Internet of Things has led to an entire new era of security concerns, which Avast is well-poised to address for our customers.”

Avast’s presence in the U.S. is growing

Ambassador Shapiro described the success of Avast in Czech Republic and beyond its borders. He said, “Avast has been extremely successful here, but what you might not know is that Avast is also the most successful tech company from the Czech Republic in the U.S.”

He spoke about Avast’s growing presence in Silicon Valley which will attract new talent and accelerate its growth stateside.

“Currently there are more than 15 million Avast customers in the U.S. and there is still an enormous opportunity,” said Ambassador Shapiro. “Tech will continue to connect us as we discover new ways to help our citizens, and make the world a safer place.”

Grandmaster Garry Kasparov challenges 11 players at once

Garry Kasparov chess challenge

Chess Grandmaster Garry Kasparov plays 11 challengers at once

Former World Chess Champion Garry Kasparov was Avast’s special guest for the evening. The highlight of his visit for gala guests was watching him play against 11 opponents simultaneously. Five lucky Avast employees and 6 guests were chosen to be the Grandmaster’s opponents. It took Kasparov less than one hour to decidedly defeat each of the star-struck opponents, however no players were beat in less than 20 moves.

Guest player Alex Barrasso, five-time winner of the U.S. Championship for Blind Players, said, “For any chess player – whether you’re a casual player or a serious player – just to get the opportunity to sit across the board from someone like him, who is perhaps the greatest player ever to live, is an honor.”

Guests treated to behind-the-scenes tours and demonstrations

Beside the 6 meter wide staircase that connects the floors of Avast, experts from different areas set up demonstrations and hands-on activities for guests. Avast for Business showed how simple it is for SMB’s with limited resources to use our free, cloud-managed security product to protect their devices and customer data. Avast Mobile Security analysts set up a café scenario and showed guests what a hacker could see on unsecure Wi-Fi hotspots and how connecting with Avast SecureLine VPN can keep you save.

The showstopper of the evening was the Avast Virus Lab. The new monitoring wall shows attacks against Avast users happening in real-time and how many threats are blocked by Avast. In the last 30 days, as Virus Lab Analyst Michal Salat explains, Avast blocked 1.590 billion attacks against our users.

Virus lab Monitoring Wall

Michal Salat explains the Avast Virus Lab monitoring wall

Party on the 7th floor

Avast party food

The talented chefs of the Avast canteen prepared delicious treats for the guests

After the building tours, demos, and chess challenge, the party began. The food was plenty and delicious, and the drinks flowed until the wee hours of the night.

The 7th floor is the fun floor, complete with canteen, recording studio, cinema, video arcade, and a quiet area with the library and hammocks for a quick power nap. No napping was going on this time, as partiers mixed and mingled to the sounds of a DJ spinning the sounds and constant conversation.

The Avast Grand Opening was a great way to inaugurate our new beautiful headquarters. For more pictures, please visit the Avast Facebook gallery.

 

AV-Comparatives report: Avast takes the gold for Overall Performance

Avast was awarded the title of Top Rated Product for 2015 by AV-Comparatives.

Avast was awarded the title of Top Rated Product for 2015 by AV-Comparatives.

Recently, AV-Comparatives released their 2015 Summary Report, an important resource for anyone who is interested in security solutions and antivirus software. Avast had a few exciting wins in this year’s report, which we plan to build upon as we continue moving forward into 2016.

Firstly, Avast was awarded the title of Top Rated Product for 2015 by AV-Comparatives. In their report, AV-Comparatives writes:

“Avast is a Top Rated Product this year, receiving five Advanced+ awards in the course of the year, including both Real-World Protection Tests. . . We feel its scan-results dialog box is equally well suited to expert and non-expert users.“

In addition to being a Top Rated Product, Avast also won the Gold Award for AV-Comparatives‘ Overall Performance Test, as well as a Silver Award for the Malware Removal Test.

In describing their Overall Performance test, AV-Comparatives adds that Avast demonstrates a significantly lower impact on system performance than that of other products. This means that Avast doesn’t disturb you while you browse, work or play on your PC.

How to make your PC’s performance the best it can be

If you’re experiencing a sluggish computer, there’s several things you can do to improve your system’s performance.

  • Make sure your software is up to date. The most up-to-date software contains fixes and patches that makes it run at its best. Avast 2016 products have enhanced features and the highest detection rates to protect your computer from malicious attacks. Software Updater is a feature in Avast 2016 that helps you ensure that your programs are up to date.
  • Old hardware. If you try to install modern software onto your old computer, it could start running at a snail’s pace, because the hardware simply is not capable of running the software. Ideally, buying a new PC with a multi-core processor is the best solution. However if your budget does not include a new computer, then you could add more RAM.
  • Stick to one security program. It’s not advised to run more than one security program with real-time protection at a time. Please uninstall any trial software that came with your PC before installing different protection. You can find a list and instructions to remove here. We recommend that you follow the vendor’s instructions before proceeding with the uninstallation.

Follow Avast on FacebookTwitterYouTube, and Google+ where we keep you updated on cybersecurity news every day.

Privacy on the Internet: There is no such thing as a free lunch

This is a reprint of The elusive “P” which appeared in the January 2016 issue of Indian Management.

Indian Management Privacy

There is no such thing as a free lunch, truly.

As we increasingly traverse the virtual realm, we are putting at stake a crucial aspect—our much-treasured privacy.

There is not a lot of privacy on the Internet today. Every place you go – websites, social networks, apps – all know your IP address and where you are located, which they can correlate with your demographics, age, gender, and the websites that you visit. Social networks can even tell advertisers what your political leanings are and which religion you practice, and the Internet knows which books you read, which cosmetics you use, and whether or not you are pregnant, getting married or divorced. At the end of the day, search engine companies and Internet Service Providers know everything about you. With the up-rise of the Internet of Things, Internet-connected devices can dig even deeper into our lives. Our cars remember when we drove where, how fast we went, and what music we were listening to, while our smart watch can tell us more about our health than our doctors can. Privacy is a thing of the past.

A trade-off between convenience and privacy

In our day-to-day usage of the Internet, each of us are either making a conscious or unconscious trade-off between convenience and privacy.

One example of this can be seen in Gmail, the hugely popular email service used by nearly one billion people around the world. Most people will, but others might not recognize that they receive advertisements which are somewhat related to the subject of their emails. This is due to the fact that the subjects of a user’s emails are sent to various advertising engines to come up with relevant content to serve back to the Gmail user. For someone who sent an email with ‘vacation’ in the subject line, this may result in the user receiving ads with flight offers during the following days.

As a consumer searching for different things on the Internet, you are likely making the connection that advertisements that you see are based on the searches you have recently made. This is the result of targeted advertisements, which can simultaneously provide true value and can also cause problems or be embarrassing. For example, if a family shares one computer, certain family members may not want their parents or children knowing about their search history. This becomes difficult to avoid with targeted ads, since the ads displayed are related to search items that were originally intended to be confidential.

Taking this a step further, we also need to start thinking about the advancement of our smart devices. One big enabler of privacy violations is geographic tracking embedded in everyone’s devices — from our smartphones to our cars. As geotracking becomes an everyday feature in cars, people can effortlessly follow their spouse or child while they are driving, keeping track of their speed, location and driving habits. While this could potentially encourage safe driving, it could also have negative effects on those who don’t want to be surveilled. What’s more, the data collected by a car could be sold to insurance companies that will refuse payment in the case that an accident was caused by speeding.

For the most part, people may understand the risks that come along with the development of smart devices. However, when feeding companies with mass amounts of data collected by these devices, users continue to make a conscious trade-off that results in the loss of their personal privacy.

Free software and the lure of fast click-through agreements

One of the reasons why people so easily and willingly give up their privacy is that most of the software they download comes with no price tag attached to it. Back in the 90s, software was sold in stores and was fairly expensive for the average consumer. Now that the majority of software is downloaded online and is distributed largely free of charge, the products come with a price tag of a different kind — the infringement on consumers’ privacy and security. This issue is heightened by the fact that many people don’t take the time to read through their software’s click-through agreements.

The real question is this: What does a user receive in exchange for giving up their privacy? Additionally, are they willing to lose the convenience that software and apps provide if they want to keep their privacy intact?

Certain services of trusted companies can serve very useful purposes, such as free email services, search, text messaging, social networking, health monitoring, or child safety; and targeted advertising by social networks, search engines and other web services is not seen as risky. The more an app or web service knows about you, such as your location, your interests, your contacts, the better they can target you. Some people prefer seeing targeted ads, as the ads displayed become increasingly relevant for them, while others find targeted advertising to be, to a certain extent, an invasion of privacy.

The only way to completely prevent being spied on in today’s day and age would be to not use the Internet nor smart devices and free services that access sensitive data in order to target ads.

There are, however, tools in the market, like browser-add-ons that provide consumers with information on web interactions with social media sites, advertising networks that share data, and the analytics used to improve a website. Clever technology can identify these from either cookies or programming code that is embedded in the website. There are also apps for mobile users helping them understand which data apps can access and which ad networks they serve.

A joint effort needed between industry and politics

Although there are solutions available, it cannot be solely the consumer’s burden to determine how to navigate the trade-off between privacy and convenience. It’s not possible for users to stay 100% informed about what happens to their data, as most companies simply don’t communicate these things to their customer base. To combat this issue, companies should focus on increasing their transparency, making their privacy agreements easy to the average user to understand, and putting significant effort into educating their customers. Politicians will also need to determine just how far companies can legally go with the collection and distribution of user data.

Microsoft ends support for older versions of Internet Explorer

Internet Explorer icon

Update from an older Internet Explorer to avoid security risks

After January 12th, only the most current version of Internet Explorer available for a supported operating system will receive technical support and security updates.

People using Internet Explorer 8, 9, and 10 will no longer receive security or technical updates after Tuesday, January 12th. This means that the older versions of Internet Explorer can be exploited by hackers which puts your computer and your data at risk. One last patch will be released January 12th with a reminder to upgrade your browser. If you do not upgrade to Internet Explorer 11, you will begin to receive “End of Life” upgrade notifications urging you to make the switch to Internet Explorer 11. Windows 10 and Windows 8.1 users should upgrade to Internet Explorer 11. Windows 7 users with Internet Explorer 9 or 10 should upgrade to Internet Explorer 11.

Choose a different browser

If you want to stay with a Microsoft product, then you also have the option to switch to Microsoft Edge, their latest, most modern browser, but you must also be using Windows 10.

This is a good opportunity to try another browser like Google Chrome, Firefox, or Opera.  We recommend Google Chrome as an alternative to Internet Explorer because of its security features and automatic updates.

There are plenty of alternative browsers to switch to as well; those that specialize in gaming, privacy, media consumption, and other things. Check out this listing of 10 obscure, highly specialized browsers from PCWorld.

How to check which version of Internet Explorer you are using

  1. 1. Open the browser
  2. 2. Click the gear or Question icon on the top right
  3. 3. Select ‘About Internet Explorer’ and a pop-up will appear with the version of your browser

Follow Avast on FacebookTwitterYouTube and Google+ where we keep you updated on cybersecurity news every day.