Avast CEO, Vince Steckler, joined a panel of top security experts for a roundtable discussion about cybersecurity in our everyday lives.
Read ‘Talking Cybersecurity at Home, the Office and In-Between’
The popular messaging app, WhatsApp, has improved its privacy by encrypting all the messages that are sent with their service. We explain what this means to you and how to make sure you and your friends benefit from the higher security standards.
Remember that bullying is never your fault, and it can happen to anyone. Bullying may make you feel embarrassed and like you’re all alone. But you’re not alone and it’s important to find someone who can help you through the situation. Reaching out to someone you trust.
~reminds Facebook
Facebook and other social channels are space for communication, sharing, and connecting with others. Unfortunately, it is also a space where cyberbullying takes place. Research provided by different organizations in the USA and UK shows scary numbers, and we are definitely witnesses of a new form of bullying on a massive scale. The psychological consequences can be very dramatic, therefore education is crucial for prevention and fighting this new phenomenon.
Read on to learn what to do if you or a friend is the victime of a cyberbully on Facebook.
Last week was an exciting week for professionals in the security industry. CeBIT 2016, an annual global conference with an emphasis on digital business and transformation, brought in security experts from across the globe to Hanover, Germany.
During the third day of CeBIT, Avast CEO Vince Steckler spoke on a panel titled “Safeguarding Business”.
Last week, Avast held a two-day Data Hackathon in our Prague headquarters. Our hackathons give Avast employees a chance to hone in on their creativity and resourcefulness while working together with colleagues from various other departments within the company. Hackathon teams create prototypes of apps and hardware for both internal and external use.
Mac users got attacked by ransomware in the first fully functional attack on OS X. Now that hackers have proven that Mac users are a viable target, it’s time to move on from the myth that Macs are impervious to attack and get protection.
Ransomware attacks targeting PC users are quite successful. New variants are introduced, but they have the same format- encrypt your files and demand payment for the key to unlock them. The Avast Virus Lab did a deep analysis of ransomware dubbed Locky. This is deep look was followed by Locky’s JavaScript downloader, which describes the phishing campaign that has emerged as the main infection vector.
How many of you know the fact that your daily e-mails are passaged through a deep espionage filter?
This was unknown until the whistleblower Edward Snowden broke all the surveillance secrets, which made privacy and security important for all Internet users than ever before.
I often get asked “How to send encrypted email?”, “How can I protect my emails from prying eyes?” and “Which is
Today at CeBIT 2016, Avast CEO Vince Steckler delivered a keynote speech focusing on the security risks in mobile enterprise environments. In his presentation, he discussed how mobile activity influences both employees and employers alike. Let’s take a closer look into the speech:
For Mac users, hell has finally frozen over. The first case of working ransomware targeting OS X was reported this past weekend.
“This is the first one in the wild that is definitely functional, encrypts your files and seeks a ransom,” said Palo Alto Threat Intelligence Director Ryan Olson in a Reuters interview. The researchers dubbed the ransomware “KeRanger.”
Ransomware has successfully attacked Windows and Android users, usually when a user is tricked into clicking an infected link in an email or an infected ad on a website. The ransomware then locks all the files in the system and demands money for a key that will unlock the files. (another good reason not to click on links in emails.)
“Any ransomware that gets onto your device, whether a Mac, PC, or smartphone, is a serious threat. Most people are scared when they see their device has been locked and their data has been encrypted so they pay the ransom,” said Jan Sirmer, a researcher from the Avast Virus Lab. “We generally advise against paying the ransom, because this rewards the malware authors for their work and encourages them to continue spreading ransom, but sometimes it can’t be helped.”
One of the most recent attacks locked up the servers of the Hollywood Presbyterian Medical Center in Los Angeles. Because their patient records are vital to hospital operation, they opted to pay $17,000 in bitcoin, the preferred digital currency of cybercrooks, to get them back. Law enforcement offices have been victims as well.
“It is the responsibility of each agency to ensure their networks and information systems are secure while it is the responsibility of DHS to provide a baseline set of protections and government-wide situational awareness, as part of a defense-in-depth information security strategy.”
So, “until its intended capabilities are more fully developed, DHS will be hampered in its abilities to provide effective cybersecurity-related support to federal agencies,” reads the report.