Tag Archives: General

Life beyond the screen: Coming face to face with technology addiction

Photo via Telegraph online

Photo via Telegraph online

Believe it or not, there’s more to life than what’s happening online! In its beginnings, technology was intended to make our lives simpler and more convenient. When technology becomes an addiction, however, it can become dangerous to our mental and physical health, not to mention our personal lives.

Avast is a technology and security company. At the same time, we’re also human beings. By sharing cybersecurity news on our blog, alongside our forum and social networks, we aim to make things simpler for our users — providing them with safety tips to avoid headaches and losses of time. In other words, we’d like everyone to reserve as much time as possible for the parts of life that truly matter.

Recently, a study found that students’ performance can significantly decline due to technology addiction. To fight students’ urge to be active on their devices when they shouldn’t be, there are several apps that have been created that close and prevent other apps to be opened, ensuring users to be able to stay focused and concentrated on their classes, research or homework.

Since it has become this difficult to pry ourselves away from our screens, it’s sometimes a good thing to occasionally be left without battery or network coverage. This way, we’re essentially forced to put off our thoughts about what’s being published on social media and focus on the things that are taking place around us.

Here in Brazil, it’s not uncommon to see signs at bars or restaurants that read something similar to “we don’t have Wi-Fi, talk among yourselves” or “we don’t have Wi-Fi, bring a friend to talk to”. These places don’t do this because they need to save money on their Internet bill — instead, it’s about providing their guests with human interactions and a genuine experience.

It’s our job to use our current technology wisely. When it’s time to concentrate and focus, Avast is there to keep our users safe from spam, scams, and hackers — things that cause us to lose time and energy.

You can depend on us to keep your security (and peace of mind) in tact. We urge our users to recommend Avast to the ones who they love and who they want to spend quality time with.


Follow Avast on FacebookTwitterYouTube, and Google+ where we keep you updated on cybersecurity news every day.

Has the Windows Phone Store become a new target for hackers?

Almost exactly two months ago, we reported on some fake apps found in the Windows Phone Store. Unfortunately, the news hasn’t stopped there – instead, it seems that this third-party app store is becoming an increasingly popular platform for the bad guys. Today, we‘ve uncovered quite a large set of fake apps which includes scams imitating legitimate popular apps such as Facebook Messenger, CNN, BBC, and WhatsApp.

Fake apps advertised by Ngetich Walter on the Windows Phone Store.

Fake apps advertised by Ngetich Walter on the Windows Phone Store.

There are two perpetrators behind these fake apps: Ngetich Walter and Cheruiyot Dennis. Between the two of them, they have 58 different apps available in the Windows Phone Store, all of which are fake. The majority of the apps have certain things in common — they collect basic data about users and display various advertisements that are mostly driven by a user’s location. A portion of the apps try to lead users to pages that force them to submit a request to purchase something. Let’s take a closer look at two of them:

1. World News CNN (a.k.a. Abundant Life): What first appears to be a CNN World News app is actually an evangelical message titled “Abundant Life“.

wp_ss_20151006_0027

2. Fake Avast Antivirus: Along with the illegitimate social and news apps we discovered, there were even fake Avast apps added into the mix. Fortunately, each of the fake Avast apps are harmless and don’t accomplish anything more else then redirecting users to Avast’s website and displaying advertisements to the user.

wp_ss_20151006_0009

Money, money, money

It’s fairly obvious that hackers don’t do this sort of thing for free. After looking into monetization methods, it appears that hackers are primarly using two ways to profit from producing and circulating fake apps on a large scale:

1. Advertisement clicks: Apps load different kinds of advertisement kits, which are clicked either by the user or, in some cases, the app itself. Theoretically, the bigger the number of apps that you advertise on an app store, the larger number of clicks you would receive – another reason that hackers often offer a large number of fake apps at once.

2. Misleading advertisements: Certain ad servers are remotely controlled, giving them the power to switch different advertisements on and off. In some cases, those ads lead to scammy pages that try to convince you that your device has security issues and that you need to install some other paid product to fix it.

What is the motivation behind propogating fake apps?

These days, the Google Play store and iTunes continue to implement smarter solutions to protect their entire ecosystems. This approach is making these systems quite difficult to attack and monetize, causing hackers to avoid them altogether. As a result, a less widely used, third-party app store such as the Windows Phone Store is an ideal place for a hacker to hunt for security loopholes. On top of analyzing the reasons behind why these cybercriminals do what they do, it’s also interesting to consider the fact that often, fake apps remain on third-party app stores for weeks and even months at a time. For some reason, no one takes the time to report bad apps, even if it’s clear that they are fake and the majority of user reviews are extremely negative.


Follow Avast on FacebookTwitterYouTube, and Google+ where we keep you updated on cybersecurity news every day.

Avast at Virus Bulletin Conference 2015

Our team had a wonderful time meeting and networking with the crème de la crème of security industry professionals at this year’s Virus Bulletin Conference in Prague, of which we were a proud platinum sponsor. Throughout the conference, a handful of Avast employees presented talks a variety of today’s most prominent security-centered topics. For those who weren’t able to make it to the conference, we’d like to provide a brief recap of the content that was covered.

Taking a close look at denial of service attacks

Avast senior malware analysts Petr Kalnai and Jaromir Horejsi discuss distributed denial-of-service (DDoS) attacks.

Avast senior malware analysts Petr Kalnai and Jaromir Horejsi discuss distributed denial-of-service (DDoS) attacks.

In their presentation, “DDoS trojan: a malicious concept that conquered the ELF format“, senior malware analysts Petr Kalnai and Jaromir Horejsi discussed the serious issues relating to distributed denial-of-service (DDoS) attacks.

Abstract: DDoS threats have been out there since the Internet took over half of global communication, posing the real problem of denial of access to online service providers. Recently, a new trend emerged in non-Windows DDoS attacks that was induced by code availability, lack of security, and an abundance of resources. The attack infrastructure has undergone significant structural, functional and complexity changes. Malicious aspects have evolved into complex and relatively sophisticated pieces of code, employing compression, advanced encryption and even rootkit capabilities. Targeted machines run systems supporting the ELF format – anything from desktops and servers to IoT devices like routers or digital video recorders (DVRs) could be at risk.

In this session, Petr and Jaromir examined the current state of DDoS trojans forming covert botnets on unsuspecting systems. They provided a technical analysis of the most important malware families with a specific focus on infection methods, dynamic behavior, C&C communication, obfuscation techniques, advanced methods of persistence and stealth, and elimination of rivals. After studying cybercriminals’ behavior, our two speakers introduced their operation tools, including vulnerability scanners, brute-forcers, bot builders and C&C panels. They explained that in many cases, it’s unnecessary to apply reverse engineering within the analysis — the original source codes are indexed in public search engines and their customization is a subject of monetization. The pair concluded their presentation by introducing tracking methods and techniques and revealed the targets of these attacks.

Taking mobile security to the next level

Avast security researcher Filip Chytry talks about privacy in the mobile sphere.

Avast security researcher Filip Chytry talks about privacy in the mobile sphere.

Next up was security researcher Filip Chytry’s talk, “Privacy: a growing commodity in the modern age and our Remotium virtual solution to protect it“. Filip’s presentation focused on a few mobile apps that have experienced privacy leaks and provided insight on what could be used as potential solutions to these types of security breaches.

Abstract: Today, we are surrounded by millions of sensors that measure and monitor our lives, cities, travels, homes and communities. There are currently more online endpoint devices and sensors in existence across the globe than there are human beings. Smartphones have become unbelievably integrated into our daily lives, and these tiny gadgets are just the tip of the iceberg that is the modern spying age. Take cameras, for example — when you get the chance, try taking a stroll around a city and see how many cameras you can spot. These could be cameras belonging to other people or surveillance cameras capturing public images. Whether they were taken accidentally or intentionally, it’s difficult to argue with the fact that each of us is featured in public images and visual data that we remain largely unaware of.

Filip pointed out that when examining this issue through a mobile lens, it’s interesting to take a look at apps which benefit us in some way. Although these apps can lend us a helping hand or aid us in socializing with our peers, they often sharing certain data with developers that the average person is likely unaware of and would be uncomfortable with sharing. Filip went on to explain that in the worst case scenario, these apps’ developers can implement poor security standards which could permit leakages of data shared by the user. Concluding the presentation, Filip explained that Avast Remotium is a virtual space that allows users to mask their data, delivering unidentified data in its place in order to protect against data leaks and privacy breaches.

Home Network Security in the spotlight

Pavel Sramek and Martin Smarda discuss home network security issues.

Pavel Sramek and Martin Smarda discuss home network security issues.

Another two stellar Avast malware analysts, Pavel Sramek and Martin Smarda, presented “Solving the (in)security of home networked devices“. This talk outlined real-life issues of home network devices and examined potential risks related to the devices, a topic which is extremely relevant at this time.

Abstract: In the past few years, there has not been a VB conference without a talk about someone hacking the devices they have at home. Be they routers, NAS-es or ‘smart’ TVs, there is always one thing in common — the vendors ignore the problems and refuse to patch their products. We are developing an automated vulnerability scanner intended to test devices without our code running on them. The intention is to educate users about the misconfigurations and vulnerabilities that are detectable from another device in the network. Integrating such a scanner into consumer AV brings home network security to a new level and increases user awareness of those issues. We will present the technology and the challenges we faced on the way towards accomplishing this goal via maximizing the impact of even the simplest vulnerability scans.

Pavel and Martin acknowledged that while a couple researchers reporting an issue is simply not enough pressure to affect manufacturers’ decisions, the possibilities could be huge if millions of users reported this problem to their vendors or made the decision to replace their devices with more secure ones.

Fun at the Avast booth

A bottle of our own Avastweiser beer!

A bottle of our own Avastweiser beer!

In addition to the presentations given by our talented speakers, Avast had a handful of fun activities to offer to Virus Bulletin attendees. At the Avast booth, our team served three types of Czech beer in addition to our own Avastweiser brew, which we handed out to visitors free of charge.

Attendees had the opportunity to join Avast in a tournament of old-school Arcade Games, which we rented from Prague’s Arcade Museum. Among the prizes were a smartphone-controlled paper airplane and a Cheerson CX-20 drone!

We’d like to thank everyone who attended Virus Bulletin 2015 for their interest and support in the security and antivirus industry. We look forward to what next year’s conference has in store!

 

 

 

 


Follow Avast on FacebookTwitterYouTube, and Google+ where we keep you updated on cybersecurity news every day.

Why independent testing is good for Avast Antivirus

avtest_certified_homeuser_2015-08

Avast Free Antivirus just received another AV-Test certification for its stellar protection against real-world threats, performance in daily use, and usability.

 

Yay! It’s like collecting another trophy for the display case or another blue ribbon to hang on the wall, but what does it really mean? How is this type of testing useful for you, our customers?

Ondrej Vlcek, Avast’s Chief Operations Officer explains,

Because of the overwhelming growth of malware targeting consumers and businesses, labs like AV-Test Institute have become an invaluable independent source of data to Avast. Their research has influenced our engineers to expand their knowledge of malware, revolutionize diagnostic and detection methods, and facilitate strategies to get real-time updates to hundreds of millions of people who put their trust in our antivirus products.”

Here’s a little background on the testing lab.

AV-Test Institute is an independent lab designed specifically for testing and researching malware. Located in Magdeburg, Germany, they inhabit 1200m² (12,900 ft²) of space with 3 server rooms and a variety of main and secondary laboratories.

Safety protocols

AVTest labs networks

image via www.av-test.org

Just like a specialized facility that deals with infectious agents, AV-Test has set up safety protocols to avoid accidental infections. The hazardous material they store includes 330 million pieces of malicious test data collected over the past 15 years. Every day, they collect another 390,000 new samples of malware.

Thirty specialists work in three labs with more than 100 workstations connected to three physically separate networks: Red for all the test malware with no internet access, Yellow has limited internet access for malware testing, and Green has full internet access so they can download and update programs.

Test Procedures

Every two months, antivirus products are run through a series of tests using a pre-determined configuration that mimics that of the real world. The AV-Test lab looks at three areas: Protection, Performance, and Usability.

In the August 2015 round,  22 products were run through grueling tests. The products can earn a maximum of six points in each of the three test categories for a total of 18 points.

For example, in the Protection category, Avast Free Antivirus had to recognize over 330 zero-day malware attacks, which means they are new, still unknown threats. In the second phase, the objective was to recognize and defend against just under 45,000 known malware threats from the AV-Test reference sets. The average results for the July and August test were 98% detection for zero-day. Avast Free Antivirus scored 99% and 100%, for an average of 99.5%. Avast Free Antivirus identified 100% of widespread and prevalent malware in the second phase. We improved our overall score over the previous test by a half a percentage point, which makes a difference in the real world.

Certification

The award of an AV-TEST CERTIFIED seal of approval is evidence that Avast Free Antivirus has achieved the level of performance and protection defined by the AV-Test labs.

Tests like these, and the ones by Austrian lab AV-Comparatives, are not only for security geeks, but useful for our customers. Even if you never read over the results, you can be guaranteed that we take them seriously and strive to use the information to create the best products we can to protect your home and business PCs, Macs, and Android smartphones and tablets.


Follow Avast on FacebookTwitterYouTube, and Google+ where we keep you updated on cybersecurity news every day.

Cybersecurity tips for business travelers

business trip - working late

Sensitive business data is at risk when you travel. Take precautions to protect it.

Cybersecurity is not limited to your office or home. Nowadays, many of us use the same devices for work and personal business, so when traveling we need to be extra diligent to protect our devices and the data we have on them. If you use common sense and a bit of Avast technology, all your devices – laptops, smartphones, and tablets, can remain secure wherever you are.

Here are a few things you can do before you go and while you’re on-the-road:

1. Install antivirus protection. Your first and best line of defense on your PC or Android device is antivirus protection. Install it and make sure it is up-to-date.

2. Keep your operating system and software up-to-date. Hackers take advantage of software with security holes that have not been plugged, so take time regularly to make sure that your software and apps have patches and updates applied.

3. Lock down your device. Make it a habit to lock your PC and phone with a PIN, password, or even a fingerprint. Avast Mobile Security even allows you to password-protect your apps. Before you travel, make sure your critical apps, like access to your bank, are protected.

4. Turn off auto-connect. If you have your phone set to automatically detect and connect to available wireless networks, then turn it off. It’s much better to choose yourself. The new Avast W-Fi Finder can help you find secure Wi-Fi hotspots. Look for it to be released soon.

5. Avoid unencrypted Wi-Fi networks. Free Wi-Fi hotspots sure are nice, but they are not worth the risk to your personal data. They are unsecured and can give cybercrooks access to your internet-enabled devices. The safest way to use free Wi-Fi, even that supplied by your hotel, is to connect via a virtual private network, otherwise known as a VPN. The name sounds complicated, but with Avast SecureLine VPN, it is as easy as pushing a button.

6. Use smart passwords. Using a password like 1234 or password is not a smart thing to do at any time. But discovering that your account was hacked when you are traveling can ruin your trip. Plan ahead and manage your passwords in an intelligent way. There are plenty of memory tricks you can use to create unique passwords or you can let a password manager take care of the heavy lifting for you. Look for a new Avast password manager coming soon.

7. Think before you overshare. There are differing opinions about oversharing your location on social networks. Some say that broadcasting to the world that you are away invites a burglar into your home. Others say that broadcasting your whereabouts with regular updates is security in and of itself, because your friends and family know where you are in case something happens. And it could protect your contacts from the “I was arrested in Niagara Falls and need you to send bail money via Western Union” scam. Talk with your family and decide how you want to handle that.

8. Guard your devices. Thieves often target travelers. Don’t let yourself get so distracted that you lose track of your devices. Install Avast Anti-Theft before you leave. One of its useful features is called Geofencing. This allows you to set a perimeter, say around a table at an airport cafe, and if your mobile phone leaves that perimeter, an alarm will sound. If you discover any time that your smartphone or tablet has been stolen, Avast Anti-theft lets you control your cell phone remotely. You can locate and track your lost phone, remotely lock or wipe the memory, and even activate a customizable siren or alarm.

The best thing about all these tools is that they are free (or in the case of SecureLine, a free trial), so the next time you start packing for your business trip, make sure that your devices are ready to go too.


Follow Avast on FacebookTwitterYouTube, and Google+ where we keep you updated on cybersecurity news every day.

Making technology simpler: Thanks to my mother

Some days ago we wrote about scams targeting senior citizens. This group is at risk because generally speaking, they have less computer education than younger people who have grown up in the digital world. I recommended the reading to my mother, thinking she will benefit from it. She thanked me, but said that there were “some things” she did not understand.

Learning to surf internet

Friends and family can help senior citizens enjoy a safe online experience

In the Avast blog we do our best to write in simple terms. However, we know much more about security and, quite frequently, explains things in technical writing. So, I’ve take some time to write what will be useful for your mother (and mine). What about recommending her to read this?

Computer and mobile security essentials for senior citizens

  • Ask for help from one you trust. Don’t be ashamed to ask for help. Remember there are a lot of people that love to help and share knowledge. Start with your family and friends. If you and your friend both have Avast installed, it’s possible for them to remotely access your computer.  If they don’t have spare time or knowledge, then try the Avast Community Forum. With sections in several languages, you’ll find friendly people that could guide you with security technology. Find us there!
  • Install and keep your security software updated. Avast makes everything simple for you. All the “difficult tasks” have been automated: Protection against viruses and malware, blocking spam, preventing fraud and hacker intrusions, automatic updates of your software.
  • Scan and protect your network. That “complex” device with lights blinking that gets you on the internet is called a “router”. Do you know that it could be the weaker part of your network? Avast can scan your home network and make sure it’s secure. Our next Avast version will give you much more control of an online pain: Passwords. Keep them updated and strong!
  • In your Android mobile devices, use an easy and comprehensive security app. Avast apps bring a lot of protective features that give peace of mind, like analyzing malicious app (maybe the ones with intrusive ads, right?). With our family of apps, you can clean temporary files, keep your battery in good shape, and stay safe when using free Wi-Fi connections. Also, to stay safe, use only known app stores like Google Play and Amazon.
  • Common sense! Do not open unsolicited emails, ever! Don’t trust strange messages about promises of a better computer, prizes, and special offers. Keep your attention always on: Do not install unknown software, and do not accept extra offers during installation of trusted programs. If you have any suspicions, ask others or in Avast Community Forum.

What do you think? Did I write enough for your mother to understand? If so, I accomplished my goal.

Special thanks for my mother (for the inspiration and love). And a special thanks to the guys that share all their time and effort to make the internet a better place and for teaching me to write with such pleasure: The volunteers on the Avast Community Forum.


Follow Avast on FacebookTwitterYouTube, and Google+ where we keep you updated on cybersecurity news every day.

Got an aging parent? Tell them about the Grandparent scam

Scammers rob elderly victims of an estimated $3 Billion per year.

A scam that has been around since at least 2008 is still active and targeting elderly folks. Seventy-four year old Avast evangelist, Bob Gostischa, who knows a thing or two about scams, security, and privacy, received a call just yesterday from a scam artist attempting to steal money. “If it happened to me, I’m sure it’s going to also happen to others,” said Gostischa.

Male Family Members

Scammers target elderly people “because they’re more gullible.”

Here’s the basic premise:

Someone either calls or emails pretending to be your grandchild. The typical story is that they have been wrongfully arrested and need bail money wired right away. Another variation says they are traveling and have been mugged or even in an accident and badly injured. After going through this frantic sob story, and if they sense that their victim is falling for it, the scammer asks for money to be wired through services such as Western Union and MoneyGram.

After the phone call ended, Bob sent us a transcript so we could share it with Avast Blog readers. “I consider myself lucky because the first instinct was wow, how can I help her…?,” he said.  “I guess we all really need to be very vigilant at all times.”

Caller: Hello Grandpa, this is your granddaughter. I have laryngitis so I don’t sound like myself

Bob: You certainly don’t. Which granddaughter?

Caller: What do you mean?

Bob: Well, I have several. Caller: Your oldest.

Bob: Oh, OK (Suspicious because she should have said her name.) Is everything OK?

Caller: No.

Bob: What’s the matter?

Caller: I was visiting a friend in Niagara Falls and on my way home, I was involved in a car accident.

Bob: Are you OK?

Caller: Yes, everyone is fine.

Bob: And the car?

Caller: The car is fine. This woman came out of nowhere, and I hit her but she’s OK.

Bob: Thank God.

Caller: Yes, but when the cops came, they asked if I was drinking. I told them no but, because I’m taking medicine for my laryngitis, I failed the breathalyzer and spent the night in Jail.

Bob: Did they assign you an attorney?

Caller Yes, but I need bail money. Can you send me $500.00 via Western Union?

Bob:  That’s going to really be hard. We just had some medical bills so things are pretty tight.

Caller: Please Grandpa, can’t you put it on your credit card?

Bob: Sorry, they are all maxed out.

Caller Please Grandpa, I don’t want to stay in jail.

Bob: Sorry sweetie, but I really can’t and don’t have any money I can send.

Caller: click…. she hung up.

“In my case, my oldest granddaughter doesn’t drive and she also wouldn’t be in Niagara Falls,” said Gostischa.  “It’s very easy to fall for a scam like this because all of us want to help family – especially our grandchildren.”

Last year, CBS News interviewed a former scammer who worked this game. He said that on a good day he could make $10,000 from the grandparent scam. “We target people over the age of 65, mainly, because they’re more gullible,” the former scammer said. “They’re at home. They’re more accessible. Once you get them emotionally involved, then they’ll do anything for you, basically.”

How to protect yourself from the Grandparent Scam

The FBI’s Internet Crime Complaint Center (IC3) has these suggestions:

  • Resist the pressure to act quickly.
  • Try to contact your grandchild or another family member to determine whether or not the call is legitimate.
  • Never wire money based on a request made over the phone or in an e-mail…especially overseas. Wiring money is like giving cash—once you send it, you can’t get it back.

What to do if you have been a victim

  • Contact your local authorities or state consumer protection agency if you think you’ve been victimized.
  • File a complaint with IC3, which may refer the case to federal, state, local or international law enforcement or regulatory agencies for possible investigation, or The Federal Trade Commission. You can also call the FTC at 1-877-382-4357 to report a complaint.

Follow Avast on Facebook, Twitter, YouTube, and Google+ where we keep you updated on cybersecurity news every day.

Avast team at Webexpo conference

This past weekend, Prague hosted hundreds of web professionals at the Webexpo conferenceAvast Software was a proud general sponsor of this event.

Avast Webexpo booth

Avast was one of the sponsors of Webexpo

Attendees could meet our team at the Avast booth, try Avast technologies, and chat with our colleagues. They could also learn first hand how it is to work for the Best Czech Employer of 2013!

Those who attended the lectures could also learn from the Avast experts. It was the second time that Michal Augustýn, Avast’s Lead Software Developer was invited to a podium at Webexpo. Michal, who has worked at Avast for more than 7 years, designs and develops internal systems for Avast Virus Lab. He and his colleagues are the ones directly responsible for the security of our users. He talked about continuous development and improvement of Avast Backend infrastructures that allows us to send up-to-date virus signatures to protect millions of Avast users.

Another speaker representing Avast was Alena Varkočková. Alena proves that there are also geeky girls (YAY!) and that to be a great Senior Software developer at Avast Software, you don’t have to be a guy! In fact, Avast employs around 20% of women. Alena talked about a big project she was involved in: Developing the infrastructure to communicate with Avast users via in-product messaging. Thanks to their work, our users see pop-ups informing about program updates, monthly virus reports, or new threat alerts.

A third developer represented Avast Software on Webexpo’s podium – Marek Beneš. Marek, who has been with us for over 5 years, talked about the importance of monitoring your work from the developer perspective. He and his colleague Alena are responsible for development and continous releases of the virus signatures, delivered to the Avast users. They are making sure that  you, Avast users, receive the best up-to-date protection.

An exciting event for the attendees of the Webexpo conference was the opportunity to ask questions to the co-founder of Avast Software, Mr. Eduard Kučera. Avast Software is considered to be the first Czech Startup and it became the most successful Czech IT company, with offices in Prague and seven other locations, to serve security products to more than 230 million users all over the world. Mr. Kučera said that the keys to our success were releasing a free version of the Avast product, great reception among its users who keep recommending Avast, and basically good luck.

Alena, Michal, and Marek  are excellent world-class specialists in their fields. If you want to learn from the best follow Michal, Alena, Marek, and Avast Developers on Twitter: @AugiCZ, @alenkacz, @bblcz @avast_dev. If you want to join the Avast team and work for a great IT company, check out our available positions.

Webexpo 2015
Presenting at Webexpo
Presenting at Webexpo 2
Avast sponsored Webexpo
Eduard Kucera founder of Avast
Exploring at the Avast booth
IMG_6817
Avast dev jobs
Would you to work for Avast

 


Follow Avast on FacebookTwitterYouTube, and Google+ where we keep you updated on cybersecurity news every day.