A new email malware campaign includes an attached file with explicit instructions for the recipients describing the steps how to get their computers infected.
The post To get infected, follow the directions appeared first on Avira Blog.
A new email malware campaign includes an attached file with explicit instructions for the recipients describing the steps how to get their computers infected.
The post To get infected, follow the directions appeared first on Avira Blog.
Even if Locky is no longer a hot news story, the financial success of this ransomware for the cybercriminals means that it – or a new and improved version of it – will be coming around again. Here are four lessons to be learned from the latest round of ransomware.
The post Locky ransomware is dead, long live Locky appeared first on Avira Blog.
You’d think bank robberies were popular only in the legendary Wild West. Ever thought your mobile banking activity can turn you into a victim of the modern outlaws?
The post Mobile Banking Threats: Secure your mobile device appeared first on Avira Blog.
The new Locky ransomware is on a roll, with cybercriminals quickly adapting malware to exploit user vulnerabilities. But they still haven’t outsmarted the Avira Protection Cloud.
The post Locky in the Cloud with Ransomware appeared first on Avira Blog.
It’s enough to make the blood run cold of every computer user – a family member calling for help: “I can’t use my computer anymore! All I see are strange messages and I can’t open ANYTHING!” Here is what one Avira employee did, didn’t do, and why the FBI can be very, very wrong:
The post My father is being held for ransom appeared first on Avira Blog.
A “white hat” is how we described the hacker who added Avira installers to the Dridex botnet distribution network. Our description might have been a bit off-color.
The post 50 Shades of Dridex Botnet Grey appeared first on Avira Blog.
A few years ago a customer phoned urgently to ask if the virus detected on their computer could infect him or his family. It was hard not to smile. For every tech guy this question sounds ridiculous and with a basic understanding of computer viruses it is clear that this fear is without any reason.
The post Will computer viruses be able to infect humans in the future? appeared first on Avira Blog.
A distribution channel of the Dridex botnet may have been hacked. Instead of getting loaded with malware, people are getting clean copies of Avira antivirus and we have two theories as to why. Do you know what a “white hat” is?
The post Dridex botnet distributor now serves Avira appeared first on Avira Blog.
Virus Lab analysts can see real-time threats on the monitoring wall
“Computer security has been around for 25 or 30 years and the threats keep evolving,” Avast CEO Vince Steckler in a video interview with ValueTech.
The solutions keep evolving too. “If you go back 20 years ago, the big issue was script kiddies and big public splashes of viruses that frankly didn’t cause any harm. These days, things are much more complicated. You don’t have big flaws, big loopholes for bad guys to take advantage of. What this turned into is a cat and mouse game.”
Avast CEO Vince Steckler
To combat today’s cybercrooks, Avast Virus Lab analysts must study what the bad guys have done previously.
“You start trying to predict what the bad guys might be trying to take advantage of in the future and closing off those holes. At the same time, those guys are finding other little ways in and you have to catch up with them,” said Steckler.
Antivirus companies have done an excellent job at protecting the consumer and small business “endpoint” – such a good job that it’s actually very difficult to break into the endpoint itself. This forces cybercrooks to look for other entry points.
Avast experts agree that the likely path cybercrooks take is through the home router.
Consumer routers tend to be acquired based on price and they have a lot of flaws. Steckler estimates that, “We can break into probably about 70% of home routers in the world.”
The reason home routers are so vulnerable, he says, is that, “They are very poorly protected and the username-password on them is something that’s easy to crack. It’s not that difficult for someone to break in remotely over the Internet via the username and password or in a drive-by, in which case it’s even easier.” Most routers also have unpatched software leaving them with a number of vulnerabilities.
Recently the hacktivist group, Anonymous, launched a DDoS attack using compromised home routers so Steckler thinks that the frequency of those types of attacks will increase.
“The Internet of Things and 4.0 get a lot of press because they have nice catchy buzz words,” said Steckler. People have connected refrigerators, connected thermostats, door locks, security cameras, and baby cameras, but, “Right now a lot of internet-connected refrigerators don’t do anything. They are just a browsing tablet.”
“But when people start looking at what kind of protection is needed, you have to be thinking about what’s the risk. If my internet-connected refrigerator gets hacked, what happens? If my thermostat gets hacked, what happens?,” asked Steckler.
“The common thing with all of this is that none of these devices in the so-called Internet of Things really have any direct connection to the Internet. They are all connected, once again, through the home router,” said Steckler.
Since the home router is a vulnerable entry point that means that the risk for attack exists. “If you can harden your home router, that really goes a long way towards protecting the Internet of Things.”
“The Enterprise is a much different story, when you get into the BYOD (Bring Your Own Device). We all have mobile devices, and for many reasons it’s much more convenient to use one mobile device for both your personal and your business,” said Steckler. “Some businesses encourage it by providing a device, but the fact of the matter is most everyone is going to be using one mobile device for both.”
That co-existence of personal and business-related data on one device that the employee is responsible for causes a risk to the consumer and the business. To the business it means that their data can be lost if access to the internal systems is compromised. If the employee loses the device, the typical company response will be to remotely wipe everything on it including all their personal stuff – then they suffer a big data loss.
“A solution is really to virtualize the entire corporate usage of it and run all the corporate usage on the corporate servers,” said Steckler. “That’s why we’ve brought out a new solution this year that does exactly that.”
Avast Virtual Mobile Platform (VMP) addresses these security risks, helping IT organizations liberate their businesses from leaks of confidential data and minimize mobile device costs.
Watch the entire interview including Mr. Steckler’s opinion about when Artificial Intelligence will become a threat to humanity and why Avast built a Silicon Valley-style building for its headquarters.
![]()
If there is a big topic related to SPAM that has been used for years and years, most of us would agree it’s… Viagra sales. It is really interesting to see those mails on the junk folder of our mailing service, trying to sneak in the desired inbox and capture our attention at least for a second.
The post Are Social Networks interested in your sex life? appeared first on Avira Blog.