Tag Archives: Yuval Ben-Itzhak

Humans the weak link in alleged White House hack

Earlier this week, it emerged that Russian hackers have successfully managed to infiltrate the computer systems at the White House.

Given the highly sensitive nature of information held within any government’s systems, we have to assume that the breach is significant. Although full details of the breach have not yet been made public (and maybe never will) some news sources indicate that President Obama’s schedule was among the information accessed.

It’s hard to see America taking this intrusion lightly, given the history between the countries and I expect to see them double down on security in the coming weeks.

Some are asking questions of the US government’s security policies and rightly so. Although protecting such a vast network of computer systems is a very complex operation. I was not surprised to learn that the attackers gained access to the system via a form of “spear phishing” attack targeting the end user.

Governments, just like any organization, are only as secure as their weakest link. Sadly, when it comes to security the weakest link is always a human. We as people are susceptible to social engineering and as such can unknowingly undermine even the most sophisticated of security technologies.
All hackers need to know is who to target and how – and then they can start to build out a profile of their victim and work out how to target them. It can take a long time but it’s often worth the wait, especially in an attack like this.

It will be interesting to see how this plays out in the coming months.

Heartbleed: One Year On

When news of the Heartbleed vulnerability broke this time last year, it was a watershed moment for the Internet and especially for security.

OpenSSL, the fundamental layer of encryption used by major websites around the world, was found to be flawed. Through a specific type of attack, a victim’s personal data including passwords, financial credentials could be stolen.

While the discovery of a vulnerability in OpenSSL didn’t come as much of a surprise to those who work in the security industry – after all, completely secure code is a rarity. Instead, the shock was the extent of the vulnerability, with around 60% of the entire web at risk.

Now, a year on, I’d love to be able to say that we’ve learned many lessons from Heartbleed and that the web is now a more secure place. Sadly, it’s not as simple as that.

Public awareness remains a major issue for Internet security. Recent research from password security developer Dashlane indicates that a year on, 86% of American’s have not heard of Heartbleed.

Dashlane spoke to AVG’s Chief Strategy Officer, Todd Simpson, about their results.

Video

The State of Online Security One-Year After Heartbleed

 

However, awareness is just one issue. Months after Heartbleed broke, I wrote of several further vulnerabilities in OpenSSL that had also emerged. Although each vulnerability discovered is theoretically a vulnerability fixed, it highlights the fact that this is still much work to be done. This is particularly true of open source software.

Open source software has several major benefits and will be around for a long time yet, but vulnerabilities such as Heartbleed demonstrate that there is risk and responsibility for all of us to protect the systems we have come to rely on.

Why has there been so little progress in securing OpenSSL and similar open source systems since Heartbleed appeared?

In my opinion, the issue lies within the very nature of open source software. OpenSSL is incredibly useful and has been adopted throughout the world, but how many people pay for OpenSSL, or donate time and money to keep it functional and secure? Not so many.

The OpenSSL Project does a great job finding and fixing vulnerabilities when they appear but in order to truly move the dial for Internet security, we need more investment.

Right now, the hands of the world’s online safety is in the hands of only a few coders working in small teams. That simply won’t do.

In April last year I wrote a blog highlighting a number of ways that we can all work together to improve the security of open source software.

Ultimately, it comes down to the fact that vulnerabilities will always exist; it’s up to all of us to take responsibility for our security.

Wearables will evolve beyond screens

A healthy human has multiple biological senses he or she was born with. Sight, hearing, taste, smell and touch are the five traditionally recognized. The ability to detect other stimuli beyond those governed by the traditional senses exists, including temperature, kinesthetic sense, pain and balance.

If I had to explain a human sense, in our digital world, I would describe it as a biological sensor that responds to a specific physical stimuli and transmits the data to brain cells that later interpret them for us and may lead to a response.

Our biological senses respond to physical stimuli, but could we develop a sensor that responds to stimuli created in the digital world?

I believe the answer is simple; yes.  For example, I could get a notification delivered directly to my brain when something important is happening, such as my child has not returned from school on time or when my glucose level is high.

The idea isn’t unprecedented. Many animals have unusual biological sensors that to support their surroundings and lifestyle. This however, took millions of years; we could create something in just a few.

Over the last few years, we’ve developed new technologies to help people with different disabilities to gain back their lost senses. Advances include a tiny eye implant that restores sight to the blind and electronic hearing devices that help people with severe hearing loss.

While these technologies are very important for our society and for the people who need them, their main goal is to restore (or provide an alternative to) the damaged/missing sense that respond to a physical stimuli.

How do we create a digital sense?

Digital senses aren’t as far away as you may think. Smartwatches have started to emerge. Although they are still in their first release version people struggle to understand the benefit of them. Is it yet another screen to look at? Does it just save me from having to take my phone out of my pocket? Will it replace some tasks I do on my smartphone? Or is it just another input peripheral to my smartphone? Where is the value to me?

While most of the available applications of a smartwatch are to bring the smartphone notifications to my eyes via a screen on my wrist, there is another – hidden- value in such devices and that is to develop a new sense. I call it the Digital Sense.

A digital sense can respond to digital events, convert them into physical ones and transmit that information to our brain cells in non-invasive methods – for example, with a combination of one or more micro vibrations. The human brain will then interpret them and respond.

In the digital mobile world, smartphones receive data from many sources: the web, email, embedded sensors and cloud services. However, the main method smartphones use to convey all this data to the human brain is via a screen. As a result, we find ourselves spending many hours in front of multiple screens in order to consume data.

Google Glass introduced new possibilities in the way we interact with and respond to our digital world. Some would say that Google Glass failed as it was too intrusive and harmful to real world social experiences.

A sensor would never do this. A sensor should be part of the body and transmit information for the brain cells to process – not to form another obstacle as we saw with Google Glass.

I believe that by taking advantage of wearable technologies and using them to transform digital data into a physical stimulus that our biological sensors can interpret, in a non-invasive way, will be the most valuable application of wearables. I believe it will dramatically increase the adoption of wearable tech as the value proposition can be immediately understood.

Imagine a smartband on your wrist or a smart device on your shirt that will vibrate or move when your glucose level is high or when your family or colleagues urgently need you.

This is not the notification sound, as we know it from our smartphone today.  They are intrusive, not necessarily private and not properly secured. It is more advanced than that. It’s a new sense that we wear and transforms our digital data into something our biological sense can transmit to our brain cells in a non-intrusive, secure and private way. This is where wearable technologies will find their home, not as an additional tiny screen.

Recently I experimented and implementation of such new sense on my wrist, and I do not feel like I will let it go any time soon.

Vulnerable Mobile Apps are just waiting to be exploited

The Apple AppStore and Google Play are doing a great job in guarding their mobile users from downloading and installing malicious apps.

By centralizing App distribution, mobile platform owners can prevent hackers from uploading malicious apps and potentially infecting millions of users. This is a great lesson that we learned from the PC days where a decentralized distribution system, and open platform, made it easy for malware to spread.

Can we claim a victory on the hackers?  Not quite yet.

The fact that the AppStore and Google Play managed to control the distribution of malicious apps does not mean there are no vulnerable apps out there.

Hackers are clever; they have found ways to get around stringent app store controls by exploiting existing non-malicious apps that are vulnerable. This can be done either via a different app, by inspecting data on transit or even via the web, while you browse from your mobile browser.

 

How can an app be vulnerable?

There are three main ways that an app can be vulnerable to hackers.

Data transmission

Almost all mobile apps transmit and receive data between our devices and remote servers. This allows apps to update, send statistics, check licenses, monitor analytics and so on. There are two ways that this leaves app vulnerable:

  • No encryption – if data leaving your device is unencrypted, hackers can ‘look inside’ it and get your passwords, credit card number or any other personal details you many not want to share. This is most common on public Wi-Fi hotspots like those found in airports, malls or coffee shops.
  • Certificate validation – when apps send data to a remote server, it’s important that it is the correct one and not one owned by a hacker. The use of digital certificates on the server can help the app validate the server’s identity. Without these digital certificates, data can be at risk.

Data storage

As we use mobile apps, most of them store data locally on our devices. These often take the form of log files, which record our activities within an app, the strings we typed in it, cached data/reports and more. There are two ways that these files can leave apps vulnerable:

  • No encryption – storing data on the device can greatly improve app performance and user experience. However, leaving private data unencrypted on the device can be dangerous. A separate app installed on the device can potentially have a permission to access such file, ‘look inside’ and retrieve personal data.
  • Files left after uninstall – when we uninstall apps from our devices, many of us expect that all related files (with our private data in them) are also removed. However, this is no always the case. Apps often have permission to create files in various locations on our devices, these can be left behind when apps are removed. Such fragments can later be accesses by other apps to retrieve data.

3rd party components

It’s quite common for app developers to release their products out to the market very quickly. As time is short, developers reuse components (SDKs) from 3rd parties to support the functionality they need. Example of popular development tools and components can be found here – http://www.appbrain.com/stats/libraries/dev

The issue with these toolkits is that they are not always secure. Here are a few examples:

  • Android WebView – many mobile apps display web content. In order to download and render such content on a mobile device, most Android developers use the WebView component. However this component was identified to be vulnerable to remote attacks – CVE-2012-6636.
  • Dropbox Android SDK – when mobile apps would like to integrate its functionality with cloud storage (like photo apps, wallets, vaults etc.) they integrate SDKs from cloud storage providers. The Dropbox Android SDK was found to be vulnerable – CVE-2014-8889. This vulnerability may enable theft of sensitive information from apps that use the vulnerable Dropbox SDK both locally by malware and also remotely by using drive-by exploitation techniques.
  • Configuration and development errors – as long as humans will continue to code software, vulnerabilities will exist. The increasing complexity of operating systems, databases, app logic and platforms, compounded by short development windows makes it very difficult for developers to catch each and every error in their code. Unfortunately this leaves large volumes of untested code that are potentially vulnerable.

 

Why do apps have these vulnerabilities?

Now that we have identified the main types of vulnerability found within mobile apps, it’s important to understand the root causes behind them. It’s not simply a question of bad coding.

Awareness

Just as with any problem, if you unaware of a risk you won’t pay attention to it. Most developers are trained to deliver functionality, not security.

Small development teams

Unlike PC products, most mobile apps require relatively small development teams. With the ever increasing functionality required and short time to market, the available time to spend on finding vulnerabilities is getting shorter and shorter.

Abandoned apps

Developers have abandoned thousands of apps due to low monetization. These abandoned apps are no longer supported and any vulnerabilities remain indefinitely.

Rush to market

The mobile world is moving faster than ever. Developers need to code and release their apps in almost ‘no time’. While the business demand functionality, that leaves almost no-time to security scanning and audits.

 

What can developers do to secure their Apps?

It’s not all bad news though, there are several things that app developers can do to improve the security of their apps.

  • Learn about secure coding and vulnerable SDKs to avoid common mistakes and deliver a secure app to your users.
  • Embed security testing in the general quality assurance procedures; from unit testing to continuous integration.
  • Use automated tools to statically and dynamically scan and test for vulnerabilities
  • Remove unneeded functionality from your code or stop the distribution of an app that is no longer supported.

 

What can App Store and Google Play do?

Still, developers are not entirely responsible for eradicating vulnerable apps. Official mobile stores employ automatic security scanners to identify malicious apps. These can often be very difficult to detect and it requires lots of resources and attention.

However, a lot of improvements can be made to help prevent the distribution of vulnerable apps.  I believe the most progress can be made in improving communication between the app stores and developers when issues arise:

  1. Developers should receive a notice once their app was found to be vulnerable.
  2. Apps that include popular development tools that were found vulnerable should be notified and asked to update the tool/SDK to a safe version.
  3. Developers should have sufficient time to release a fix, otherwise their app should be unlisted.
Reference: A list of top 10 Mobile Risks was published by OWASP group during 2014 : https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Risks
 

Our journey to over 100 million mobile downloads

Every company, big, small or start-up faces the question of what will be big four years from now. While there is no way of knowing for sure, we can learn a lot from what happened four years back.

The smartphone platform was coming to life but was fragmented across a number of platforms. How could we find out which of the platforms would grow to be the biggest?

At the end of 2009, beginning of 2010, we identified Android as the platform of the future despite a market share of only 4%. Needless to say, it was hard to explain to our finance and marketing departments.

It’s no secret that the market can give you signals about what the future may hold, you just need to know where to look.

When we watched vendors like HP, BlackBerry and Nokia dip in 2010, we noticed that Android and iOS were heading in the opposite direction. In Nov 2010, we knew we had to take action. We decided to step into the mobile market and announced acquisition of a small team of five people providing Android security. This is where our journey started.

But a bigger company acquiring a start-up does not mean the problem solved. We knew that Google ranked apps in the store via keywords so we knew that we needed to get to the top of the list. If you search for antivirus on Google, we are at the top.

A year later, we to noticed another important method to improve rankings – user ratings.  If you want to achieve a number of downloads to really affect your business, you need a user rating of at least 4.4. So we invested in a team to ensure we could maintain this rating.

Today 137 apps have passed the 50 and 100m download milestones. Keywords and review ratings are no longer enough. We are a consumer company but we know our consumers needed to engage with our products.

Understanding user behaviour helps extend the lifetime of an app so we researched what functionality people wanted from an app. The result was a new app – Cleaner. Although the functionality was already in the antivirus app, downloads started to increase. We did the same for privacy and it also grew.

My advice would be “don’t stick to one app”. Add additional services and functionality to maintain growth.

We looked at adding value – could users register when they download? Terrible idea – we had a 40% drop when we introduced this because we failed to understand the consumer.

Before you ask for value from the user, make sure you can deliver value.

Of course, we removed this and returned to the original format.

These tactics helped us reach 100m downloads but that’s only half the story. Revenue is also crucial. In December 2014, we were ranked among the top 10 developers for generating app revenue (excluding games). In February, we reached number 5.

On our last earnings call, we announced 101m downloads. Keeping them is the next challenge.  Now our whole roadmap of our company is around mobile.

Picture a connected home where each device has its own app. It would be impossible to manage such a large number of individual applications. That’s why we introduced AVG Zen.

In conclusion, if you want to know what is going to be the big thing, don’t look just at the newspapers but look at stock. Search for big shifts. They don’t happen very often but they are there.

Also, don’t just stick to data. It can help you to optimize, but really, the “next big thing” can be only be found in one place your imagination. You won’t find that in the data.

Why IoT should stand for “Illusion of Trust”

Our always on, always connected world has fundamentally changed how businesses operate. Communicating with customers and employees will never be the same again.

Cloud solutions bring many benefits by making things easier for businesses, and it’s happening whether we like it or not.

But many businesses trust the cloud blindly without proper consideration for the challenges and deeper issues at hand.

The added convenience of cloud applications also comes with a potential downside, such as potential security threats and surrender of control.

Many people are familiar with the acronym “IoT”, and we understand it to mean the Internet of Things. This is a catch-all term for our world of cloud based information and smart connected devices.

I believe there’s another meaning for these three letters – “Illusion of Trust”.

I call it the Illusion of Trust because business owners don’t realise that cloud security is an issue.

The reality is that, through their T’s and C’s, cloud providers are limiting their responsibility for the data they create and manage. This means that interruptions to service or changes of policy can leave businesses in trouble. As we hand the control, we need to consider the trust – just as we do we with employees.

No so long ago, Facebook experienced a software flaw due to a seemingly simple error that cascaded into a much larger problem causing an major outage that lasted five hours.

I personally know a number of businesses impacted by this outage.  It was unplanned, unscheduled and hugely inconvenient for the many thousands that rely on Facebook as a business tool.

Businesses around the globe trust Facebook to deliver – all the time. The same goes for other cloud-based services that millions of businesses rely on.

The following line is from the terms and conditions of a well-known cloud storage provider:

“We may add or remove functionalities or features, and we may suspend or stop a Service altogether”.

These T’s and C’s are not unusual. There are thousands of providers out there and many do not take any responsibility for losing data, for changing or suspending service, or for any outages that may occur.

Traditionally, if your employees suddenly decided to take five unscheduled hours off you’d be able to take action, wouldn’t you?  This is within your control.

But when you adopt cloud solutions, you forgo that control in return for added convenience and cost efficiencies.

Businesses are still too eager to hand over their vital services and data to cloud providers. They are placing blind trust in a system that is not entirely reliable. Instead, I believe that cloud providers should have to win the trust of businesses before they take control over important business elements.

After all, who we trust with our data and our livelihood is now one of the most important business decisions we can make as businesspeople.

I hope, over the next few years, that we witness an evolution in cloud services that focuses on transparency, flexibility and reliability.

Trust is something that should be earned and not granted unconditionally at the onset.

AVG Puts People First for Mobile Security

AMSTERDAM and SAN FRANCISCO – March, 2, 2015 – AVG® Technologies N.V. (NYSE: AVG), the online security company™ for 197 million active users, today previewed the next version of the AVG Zen™ platform to mobile operators and original equipment manufacturers (OEM). With the consumer launch currently planned for later this year, AVG Zen delivers a new family-first approach to security, including support for industry partner apps and wearables on customers’ devices, all in one place.

With digital lives becoming more complex in an Internet of Things world, security is now about protecting people as well as their devices and personal data. The next version of AVG Zen delivers three core pillars:

  • A subscription security service for families that includes AVG AntiVirus and AVG Cleaner across their devices to give them confidence in their digital lifestyle. AVG AntiVirus for Android™ was the first mobile security product to enter the 100-500 million downloads category on the Google® Play™ store.
  • A dedicated set of family products from Location Labs by AVG including phone controls and location services. Already offered by the top four US mobile operators, extending the availability of these products through AVG Zen makes it even easier for families to communicate and share location. Phone controls gives parents peace of mind when giving their children their first mobile device, allowing them to monitor and set limits.
  • A platform for mobile operators to deliver context-aware solutions for core services. This could be, for example, notifying a user if they are running low on storage or approaching their data limit. AVG Zen is open to partners looking to expand their offerings directly to AVG’s 197 million end users.

 

With global smartphone subscribers reaching 3.5 billion by 2019, industry figures calculate suppliers of Internet of Things product and service providers will generate incremental revenue exceeding $300 billion by 2020. Research into data management and security services estimates these alone will drive revenues in excess of $1.8 billion in the same timeframe.

AVG Zen enables mobile operators to provide context-aware alerts, updates and information direct to the customer to give them control and transparency of their security across their family, data, and devices.

“People not only want their online rights to be recognized, they want more control and responsibility over their online actions and those of family members. But today, their online experience is still disconnected. In the 2015 consumer trust survey we carried out with MEF, 72 percent were not happy sharing personal data with apps, 40 percent named privacy and security as important when choosing a mobile device, and another 34 percent relied on dedicated security apps to protect them,” said Yuval Ben-Itzhak, Chief Technology Officer, AVG Technologies. “Mobile operators and online security companies hold a trusted position in consumers’ lives and we have the opportunity to transform their connected experience by bringing everything together all in one central place.”

 

 

About AVG Technologies

AVG is the online security company providing leading software and services to secure devices, data and people. Over 197 million active users, as of December 31, 2014, use AVG´s products and services. AVG’s Consumer portfolio includes internet security, performance optimization, and personal privacy and identity protection for mobile devices and desktops. The AVG Business portfolio – delivered by managed service providers, VARs and resellers – offers IT administration, control and reporting, integrated security, and mobile device management that simplify and protect businesses.

All trademarks are the property of their respective owners.

www.avg.com

 

Contacts:

US

Katie Han

Waggener Edstrom for AVG

[email protected]

+ 1 (212) 551 4807

UK

Samantha Woodman

Waggener Edstrom for AVG

[email protected]

+ 44 (0)20 7632 3840

 

 

AVG Study Reveals Top 10 Apps That Ruin Your Smartphone’s Mojo

In AVG’s latest “App Performance Report” for Q4, we’re looking again at the anonymous data from over one million AVG users, compare it to our first report, and reveal what apps are the most resource-hungry on their phones.

When looking at one million of our users, we found many interesting trends that might just surprise you:

 

Spotify is now the No 2 resource consuming app overall:

Out of our total user base, 638,716 users had the music streaming service Spotify installed: what they perhaps didn’t know is that Spotify is now the second most resource-consuming app in the store (up from rank 5 in Q3).

Spotify

If you’re low on battery, space or data, keep that streaming to a minimum!

 

The changing gaming landscape

In our previous report, uber-popular FarmVille and Puzzle & Dragons topped the charts for the most resource-hungry games for Android. However, they were nowhere to be found in our Q4 roundup. A closer look shows Puzzle & Dragons and FarmVille suffered from a 50% and 43% decline respectively in installed user base in Q4 when compared to the beginning of the year (Q1/Q2).

New games such as Boom Beach and Deer Hunter 2014, however, appeared out of nowhere and secured the top spots in both usage and resource usage (not surprisingly, they’re games after all!).

Farmville

Deer Hunter 2014

[SUBLINE] Massive decline for Farmville and a rise of Deer Hunter 2014.

 

Samsung’s New Updates

After the rollout of Android 4.4.2 (October 2014), we noticed a new entry in our top battery drainers that run immediately at start up. Samsung’s Security Policy Update service, officially named Samsung KNOX™, automatically checks for security updates and downloads these automatically. While Knox is a great addition to having a full-featured antivirus product installed, a number of users and even journalists have publicly complained about not just the amount of notifications shown but also a 30-40% drop in battery life.

As mentioned in this ZDNet article, this feature cannot be turned off as mentioned by the Samsung Technical Support: “To ensure that your device always has the latest security to protect you and your data, Samsung will occasionally send security updates to the device as needed. I’m sorry to inform you that there is no option to disable these updates”.

Policy Update

Notifications

 

While we can’t stress enough that security on mobile device is critical, handset makers need to ensure their product does not reduce battery life or impact overall performance drastically.

 

Self(ie) awareness

Selfie

Taking selfies was “the” cool thing to do in 2014: selfie sticks, selfie apps, selfie phones all flooded the market. Unfortunately, some of these apps can be quite draining on a device’s battery. A new app called Candy Camera – Selfie Selfies crept up to number 7 in the top battery hungry apps that run in the background. We suggest avoid apps like these as they only should drain battery when you’re actively running them!

 

Maps & Navigation

Did we spend more time navigating and looking at maps? With more time off over the festive period, both Waze (Social GPS Maps & Traffic) and also Google Maps climbed into the Top Usage Chart:

Google Maps

 

Less gaming, more talking

Another seasonal effect: compared to Q2 and Q3 of 2014, we spend much more time on social networks and communicating through messenger apps instead of gaming. While we still spend most 49% of our time gaming on our Android devices compared to 62% in the previous quarter, social and communication apps rose to 11% and 10.3% of our total usage (compared to 6% and 3% respectively before)

 

Again, find a full list and all the data in our app report here. 

So what are you supposed to do if you’ve got one or even many of our resource drainers installed? Find out in our top tips in the next blog!

Games, Music and Shopping Apps Hit Smartphones Hardest

AMSTERDAM and SAN FRANCISCO – February 24, 2015 – Music lovers, smartphone shoppers and mobile gamers around the world could find their favorite apps are the ones eating up most of their battery life, data plan and phone storage. The results of the latest app performance research from AVG Technologies, N.V. (NYSE: AVG), the online security company™ for 197 million active users, rank the popular music streaming service Spotify, new games like Deer Hunter 2014, and even the Amazon shopping app as among the most resource hungry apps globally.

The quarterly AVG Android App Performance Report analyzes aggregated, anonymous data from over one million AVG Android app users to discover the top performance-affecting apps worldwide. Installed on over 600,000 devices across AVG’s user base, popular Spotify has moved up two places from where AVG had ranked it in Q3 to take second position behind the social networking app from Facebook, whose constant background notification checks still have the greatest impact on overall Android device performance, consistent with last quarter’s findings.

There were also four major new trends among AVG users, as identified in the latest report:

  • Game On: demonstrating the ever-changing gaming landscape, last quarter’s gaming chart toppers, FarmVille and Puzzle & Dragons, showed major declines in their installed user base, contributing to the reason they dropped out of the AVG Q4 performance rankings. They are replaced by new entrants, Boom Beach for overall impact and Deer Hunter 2014 for storage consumption.
  • Seasonal Shopping Fever: over the holiday shopping and sales period, the official Amazon for Android app entered the charts this quarter, ranked number five in the top 10 list of most all-round resource-consuming apps.
  • Home Cinema Gets Smart: previously listed in the top three battery draining apps, Netflix this quarter no longer appears in the tables at all following a November update that has resulted in significantly less battery drain. Good news for film fans!
  • Helping Hands that Hinder: tools like Clean Master or background apps like Samsung’s Security Policies designed to help keep smartphones secure and smooth, actually rank among the highest drainers of battery, storage and data plan.

“In this quarter’s app report we saw some expected seasonal changes in the app landscape, such as uplift in usage of social, purchasing and GPS-based location apps,” said Yuval Ben-Itzhak, Chief Technology Officer, AVG Technologies. “What surprised us, however, was that some of those tools and security updates aimed at improving your phone experience, were in fact impacting it quite heavily. This is not something most people would expect so we hope our report will encourage people to understand how to manage their apps to prevent them impacting negatively on their favorite mobile past-times.”

The full report, which breaks down the performance impact further according to battery drain, storage consumption and data traffic, can be downloaded from AVG Now.

Overall Performance Impact Rank App Name Category Developer
1 Facebook Social Facebook
2 Spotify Music & Audio Spotify Ltd.
3 Instagram Social Instagram
4 Path Social Path Inc.
5 Amazon Shopping Retail Amazon

 

###

About AVG Technologies (NYSE: AVG)

AVG is the online security company providing leading software and services to secure devices, data and people. Over 197 million active users, as of December 31, 2014, use AVG´s products and services. AVG’s Consumer portfolio includes internet security, performance optimization, and personal privacy and identity protection for mobile devices and desktops. The AVG Business portfolio – delivered by managed service providers, VARs and resellers – offers IT administration, control and reporting, integrated security, and mobile device management that simplify and protect businesses.

All trademarks are the property of their respective owners.

www.avg.com

 

Yuval Ben-Itzhak

Yuval Ben-Itzhak, CTO, AVG Technologies

 

Contacts:

US

Katie Han

Waggener Edstrom for AVG

[email protected]

+ 1 (212) 551 4807

 

UK

Samantha Woodman

Waggener Edstrom for AVG

[email protected]

+ 44 (0)20 7632 3840

The Internet of Things Made Simple

The Internet of Things is one of the hottest terms in the technology industry. It seems that hardly a week goes by without hearing about our connected world or the Internet of Things.

So what does the Internet of Things really mean and how can we explain it in a way that everyone can understand?

I was recently asked how I would explain the Internet of Things to a five year old and I came up with the following:

 

We all like to talk to our family and friends, our electronic devices (TVs, tablets, cameras) like to speak to each other too. They speak a different language – their own computer language, called the Internet of Things.

Just like when your parents ask you to tidy your room, or you ask them for help with your homework, our devices speak to each other to solve problems and get things done.

For example, if a bad guy came in to steal your toys, the burglar alarm would tell the police to come over and stop them, or the smoke detector could call the fire engine if there was a fire at home.

By talking to each other through the Internet of Things, our computers work together as a team to help us – just like we help our families and friends.”

 

While this is of course simplistic, it is the fundamental function of the Internet of Things, our connected devices sharing information over the Internet.

What kind of connected devices are we talking about? The Internet of Things is made up of all sorts of connected devices including:

  • Smartphones
  • Televisions
  • Alarm Systems
  • Fitness Trackers
  • Games Consoles

Any Internet connected device has the potential to be part of the Internet of Things, all that is required is that they connect and communicate with each other in order to fulfil a wider function.

If you’d like more information on the Internet of Things and the challenges that it presents, read my recent blog on Privacy and The Internet of Things.