Category Archives: AVG

AVG

AVG Receives AV-TEST ‘Top Business Security Product’ Score

Independent Security Research Leader AV-TEST recently put our AVG Business solutions to the test.  The result was a Top Product award that AVG channel partners can share with their clients.

 

At AVG, we never miss an opportunity to promote the detection and protection capabilities of our business security software. It’s even better when independent experts are also communicating the power behind our security engine. Our recent AV-TEST scores are a great example.

Our AVG Business solutions were recently awarded a Top Product score by AV-TEST in its May-June 2016 evaluation of 13 business endpoint protection software products. AVG was one of only 4 of 12 security vendors to receive this product score.

In this AV-TEST evaluation, our security technology was put through realistic test scenarios and challenged against real-world threats. We are also proud to share that this is our second consecutive high rating by AV-TEST this year.

AV-TEST, an international, independent leader in IT security and antivirus research, uses comprehensive comparative analysis methods to detect and analyze new malware.  In its analysis process, AV-TEST engineers evaluate security solutions for reliable malware detection and low false positive rates.

Here is a brief look at our results:

  • Our AVG Business products scored 100% for real-world detection with no false positives across protection, performance and usability categories, achieving 17.5 out of a total score of 18, across these categories:
    • Protection 6/6: This focuses on protection against malware infections (viruses, worms or Trojan horses)
    • Performance 5/6: This focuses on the average influence of the product on computer speed in daily usage.
    • Usability 6/6: This focuses on the impact of the security software on the usability of the whole computer

AV-TEST CEO Andreas Marx also shared his feedback on our test results. “With the market’s leading business security software solutions promoting similar features and capabilities, independent test results like ours help the decision-making process for both the IT channel and business customers. AVG’s business products have performed consistently strong in our recent tests this year and this is important for channel providers making product portfolio decisions and managing security for their business clients,” said Marx.

Our consistent product performance is a testament to our 100% focus on SMB security. We continue to be committed to helping channel partners build their businesses and put the best security defense in place for their clients’ IT environments.

Please share these results with your teams and client base. You can find more information about our AVG Business solutions at http://www.avg.com/partners. Thank you for your continued support.

Over 900 million Android devices at risk from QuadRooter vulnerabilities

What is QuadRooter?

Researchers at Check Point® Software Technologies have released details of four vulnerabilities, which they have dubbed ‘QuadRooter’, that affect Android™ smartphones and tablets built with Qualcomm® chipsets.

Any one of these vulnerabilities could be exploited by a malicious app downloaded onto the user’s device which, without their knowledge, would allow the attacker to gain full access to the phone. Considering the significant amount of personal and business data we store on our connected devices, this has major security implications.

According to Check Point, some of the Android devices that contain this chipset and which are therefore at risk include:

  • BlackBerry Priv
  • Blackphone 1 and Blackphone 2
  • Google Nexus 5X, Nexus 6 and Nexus 6P
  • HTC One, HTC M9 and HTC 10
  • LG G4, LG G5, and LG V10
  • New Moto X by Motorola
  • OnePlus One, OnePlus 2 and OnePlus 3
  • Samsung Galaxy S7 and Samsung S7 Edge
  • Sony Xperia Z Ultra

 

How to protect your Android device from QuadRooter

If you own one of these handsets, it does not mean that you have been the subject of an attack that gains control over your device. For the attack to be successful, it must download the malicious app that takes advantage of one of these four vulnerabilities to your device.

Ensure you update your handset with any security patches available for the issue. For example, Qualcomm has already released a fix for all four vulnerabilities while Google has released patches for three of the four, with the final fix expected in the very near future.

In addition, there are four steps you can take to make sure your device is as secure as possible:

 

  1. Your device should automatically prompt you to download and install the latest available updates. Tip: make sure you have a wi-fi or broadband connected before downloading as some updates can be large.
  1. Only download apps from official apps stores such as Google Play. Avoid sideloading apps, such as when you are offered an app on a web site. To ensure you get the authentic app, go to the Google Play store directly and download it from there. This reduces the risk of getting a malicious app by accident.
  1. Switch on the “verify apps” function in your Android settings. This means that even if you do download an app from somewhere else, this feature will check with the official app store to make sure it’s compliant.
  1. Protect your device with antivirus software such as AVG AntiVirus for Android and make sure you keep it updated. Should an attacker use the vulnerability to plant the malware on your phone or tablet, an up-to-date antivirus program will detect and prevent its execution.

 

The best advice I can give is not to panic and not to be complacent. Vulnerabilities like this are actually relatively common and taking preventative action quickly will help protect your devices and your data from unnecessary risk.

5 Smartphone & App Trends That Will Blow Your Mind

Our latest AVG App & Trends Report unearthed surprising trends, about apps’ rise and fall—and their troubling tendency to suck phone life. Here we are pulling back the curtain …

For the full report, check out our AVG App Performance & Trends Report (H1 2016).

I live in my own tech bubble. I work in the performance division of a world class online security firm, so most of my colleagues get the latest apps, phones, and PCs. Many of my friends are also tech enthusiasts, always trying the newest and shiniest devices.

But step outside those spheres, and things change. There is a whole other reality out there. My family and wider circle of friends, people on the streets and trains, and people in other countries often don’t care about owning the latest tech or the newest app. That’s the real world. And I have once again been blown away by our AVG App Report and what people really do on their phones …

Without further ado, here’s the top trends that made me raise an eyebrow and mutter “Fascinating!”

 

Number 1: No, not everyone owns a Samsung Galaxy S7

Sure, I don’t expect everyone on earth to have the most expensive and up-to-date Android on the market. But finding out that phones from 2012 and 2013 are still alive and kicking is startling.

Number one on the list is the Galaxy Note II, a phone that came out in September of 2012 – almost four years ago. Then came the S4 Mini, a still super popular phone from early 2013 that apparently just won’t die off. With limited storage, old Android 4.x versions, and slowly dying batteries, their owners must be feeling the age when going about their daily tasks and using newer apps.

Though Samsung obviously completely dominates the Android smartphone space, it is not alone. Sony nabbed two spots in the top ten (The Xperia Z3 Compact and Z2 LTE A) and more than 10% of the roughly 20 million devices we logged anonymously that quarter.

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/08/appreportpic1

Number 2: The Top 50 Most Commonly Used Android Apps are from Google

Google dominates the mobile OS world. No doubt about that. But Google also dominates its own world. The top most used apps on Android are Google Play Store, Google Plus, Google Quick Search Box, YouTube (yup, that’s Google), Google Chrome, Google Maps, and Google Hangouts. Only Facebook and the pre-installed Samsung Push Service made it into the top 10.

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/08/appreportpic2

Number 3: Many Apps Are Just Websites-turned-into-apps

The top 50 also includes a lot of websites-turned-into-apps, like Facebook, Tripadvisor, and eBay. The trend is double-edged unfortunately: It’s app makers continuing to push users to their mobile app, sometimes very aggressively in the case of Tripadvisor, as almost every step on their mobile website www.tripadvisor.com leads to a “recommendation” to use their apps.

On the one hand, these apps generally offer a more pleasant experience, with nicer animations, more features, and often a better look and feel. On the other hand, many of them also register themselves as startup applications and constantly check for updates and notifications in the background. This drains power and bandwidth.

If your phone doesn’t make it to the end of the day, try one thing: Uninstall all these apps and try opening up www.facebook.com, ebay.com, tripadvisor.com (and all the other apps that you’ve got that are available online) on your mobile browser. The ‘manual’ approach is likely going to save you a lot of battery life going forward.

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/08/appreportpic3

Number 4: Mighty No. 33

Another example of the “real world” bursting my tech bubble: I thought everyone except myself downloads and uses hundreds of apps. It appears both the real world and myself have something in common. I only have a total of 29 apps on my phone that I use more or less regularly, which is slightly less than average. Our anonymized data shows that users have an average of 33 apps installed. (I guess I should up my game as an enthusiast)

 

Number 5: Miitomo predicting Pokémon Go’s future?

Just recently, Nintendo had to announce that it’s massive Pokémon Go success will only have a limited impact on their revenue numbers, as most of the cash flow goes to Niantic, the company behind Pokemon (Nintendo owns only 13% of the Pokémon Go app). So while they don’t get as much as you might think they do get a boost.

But will it last? Is Pokémon just another typical app fad that goes wild and dies off? (Anyone still playing Angry Birds?)

Nintendo was in a similar situation with its first real app, Nintendo Miitomo, which let you chat with friends as Mii characters using a cool, fun environment. After launch, it died off quickly, as we anonymously logged over 127.000 installs in March – to only 17k in May. So Nintendo can’t just rely upon Pokémon Go to secure their future, but might need something that belongs to them and that reinvigorates the gaming market long-term….

Don’t believe everything you read about ‘unsafe’ security products

Online reports about the safety of security products can be very alarming, which is why we want to address those concerns and provide assurance that we take them very seriously.

You may recently have read about the discovery of a vulnerability in a number of online security products, specifically regarding ‘code hooking.’ The issue, when originally found, affected a number of antivirus companies, including AVG.

We took this vulnerability in our products very seriously when we first learned of it in December 2015, and we resolved it within two days. In fact, enSilo, the research company that identified the issue, credited our fast response in an article titled ‘Learning from AVG on Doing it Right’.

The new articles on this topic arose from enSilo’s ‘Captain Hook’ report, which details potential security issues regarding the incorrect implementation of code hooking and injection techniques. There is no reference to AVG in this report, and any media articles mentioning AVG in conjunction with this report are inaccurate.

enSilo has not disclosed any new vulnerability or security issue with our products, which they confirmed when we contacted them. Our previous experience with enSilo indicates they are a responsible company that reports issues to vendors prior to disclosing them publicly.

AVG encourages developers and researchers to report any issues with our products through our proactive bug bounty program. This process allows us to investigate potential issues fully and take the steps to fix or mitigate as necessary without unduly alarming our users.

I would like to thank enSilo for their valued partnership to date in helping us to protect our customers in an ever-changing security landscape.

One Hardcore Gamer’s Take on Pokemon Go

An inside look into how Nintendo’s popular mobile game is bridging generational gaps and keeping you outside through the lens of one avid gamer. This piece originally appeared on GamesBeat.

All technical woes aside, Pokémon Go—which I’ve been playing nonstop since its release now—is a lot of fun. While it may not offer the complex gameplay, storytelling, or character development the past decade of Hollywood-standard video games has delivered, it’s engrossing — and its astronomic growth is a phenomenon.

Which got me thinking … what does account for the appeal? As a way to come up with an answer, I’ve made these four observations, which are as much about human nature as they are about gaming culture.

1. It’s just like that one Star Trek: The Next Generation episode

Pokémon Go has been compared to The Matrix, Ready Player One, and just about every other dystopia where technology controls humans. But while Pokémon Go arguably is an addictive worldwide phenomenon whose ultimate reach is yet to be determined … wait, am I talking myself out of my own conclusion that it’s not actually dangerous to society? OK, it’s not, seriously. It does, however, remind me to an eerie degree of “The Game” episode of the Star Trek: The Next Generation TV series. In “The Game,” the crew of the Enterprise became obsessed with an augmented reality game in which the object is to throw a flat plate (Pokéball, anyone?) into a cone (Do I hear Pokémon?) in order to score and move to the next level.

Apparently I’m in good company, because Wil Wheaton, who played Wesley Crusher in that episode and later saved the Enterprise, even Tweeted about it.

The verdict: While Pokémon Go doesn’t (yet) seem to psychologically manipulate people, it is, for better or worse, mesmerizing. And people love to be mesmerized.

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/08/will pokemongo

2. I want it to keep getting better

Nintendo was once known for stellar gameplay and mechanics, but it’s been struggling to keep up with Sony and Microsoft in the marketplace. Niantic’s Pokémon Go is the first hit associated with the Nintendo brand in quite a while. As someone who grew up with Nintendo games, I hope they can turn this into a comeback and that the excitement around Pokémon Go can catapult them back to their former glory. Nintendo needs to take Niantic’s start and increase the depth, interaction, and engagement. Right now it’s simple—catch, level, feed, fight, train. Lather, rinse, repeat. Even casual gamers need more.

The Verdict: I guarantee I’m not alone in hoping Pokémon Go sticks around and gets more challenging, which just shows that people love a success story, especially when whoever’s being successful is somewhat of an underdog.

3. It bridges generation gaps

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/08/grocery pokemongo

 

I never expected that playing Pokémon Go would bring me closer to generations I must admit I barely knew—or thought I could know.

Pokémon Go has connected me with people—while grocery shopping, going for my morning run, or just walking down the street. Within the first three days I was stopped by kids less than half my age and a couple more than twice my age.

On day 2, I noticed several tweens in the grocery store pointing at me, whispering, “Look at him. …” I turned to them, held up my phone, and asked, “Pokémon?” Nods, and big smiles. Nearly 30 minutes later, while hanging out at the cheese counter where they’d caught a monster, we’d talked about smartphones, gaming, school, grades, friends, sports … and I got an all-too-rare glimpse into what it’s like to be a kid in 2016.

Day 3 brought me face-to-face with an elderly couple who wondered, as they saw me stop and hold up my phone during a run through the forest, what I was taking a photo of. I told them what I was up to, and they were in awe of today’s technology. This, too, became a conversation about how maybe they needed phones, about where they’d grown up, their family, their work, their life.

All the scary stories about people being injured or lured to harm by strangers while playing Pokémon Go, while true, likely don’t happen nearly as often as the sort of positive experiences I had with people in my own community—people I probably never would have talked to, were it not for Pokémon Go.

The verdict: People want to connect, and it’s amazing how the shared experience of a cultural phenomenon like a game—or a movie, or a book, or a TV show—can forge common ground among people who otherwise couldn’t be more different. And the more we have these experiences, the more open we are to recreating them.

4. It makes you go outside

Truth be told, this aspect of Pokémon Go does make me feel a bit uneasy: while the game’s become mainstream in a very short time and is all over the news, you can’t expect every last person on earth to know what it is or how it’s played. Which could explain the suspicious looks I’ve gotten while wandering around my quiet family neighborhood. While nothing bad came of any neighbors’ quizzical looks, I’m sure there were moments of confused uneasiness, and if you’re going to play, you’re wise to consider your surroundings and be conscious of people’s  privacy. And if you get “those” looks, explain it (or invite them to play, it could turn out well!—see observation 3).

But you can’t discount the really wonderful opportunity to explore areas near your home, work, or school that you may never have seen. I took it on my morning run (which usually follows the same route) and ended up going down beautiful forests paths I’d never seen and through neighborhoods I’d never been to. You’re essentially combining exercise, exploration, and gaming—which until now never really went together that well.

The verdict: While I am a bit torn about the overall benefits of Pokémon Go’s ability to bring you together with new people and new aspects of your everyday world (see: potentially freaking out the neighbors), there’s no doubt that its forcing players to go beyond routine is a big part of its appeal. People love adventure.

My verdict

Pokémon Go promotes exercise and getting outdoors … but it makes you look at your phone even more than you probably already do. And some of the things that account for its appeal—the fact that it’s somewhat mesmerizing—also have a flip side, in this case overly repetitive gameplay. You should play it, too, see for yourself, see if the appeal is well-founded, see if its current cult status is likely to last.

While I’ve noticed my interest waning (I spent hours on end in week 1 catching dozens of Pokémons and now use it only 15-30 minutes a day in week 2), I’m not sure yet if I’m getting tired of it overall, or if there’s going to be a “second wave” of excitement.

What’s your verdict?

Passwords Protect Your Business, but Who’s Protecting Them?

When we asked AVG Business customers in the US and UK how they keep company passwords safe, we were surprised to learn just how many of them … simply don’t.

 

Hundreds of millions of employees worldwide use passwords multiple times every day to access business resources ranging from email and domain management to banking and accountancy. These passwords—strings of letters, numbers, and symbols used to validate access—are one of your business’s primary ways to protect vital resources. But what is your business doing to protect them?

In June, AVG surveyed businesses about their password-protection policies and practices. 381 of our small-to-medium business (SMB) customers in the US and UK answered 16 questions, and here are some of the things we discovered from their answers:

  • A third of respondents believe their company’s passwords could be more secure.
  • 72% believe their workplace passwords are stored in a safe place.
  • 22% of businesses use password management software.
  • Four out of ten people use the same passwords for different business log-ins.
  • 50% of people use between 1 and 10 passwords to access different networks, software, and accounts.
  • A quarter of participants use two-factor authentication for their passwords.
  • 67% claimed there are 1-2 people who have access to their company passwords.
  • 43% of people with access to company passwords don’t have a clause in their contract to keep these passwords confidential.
  • 51% of employees save all or some of their passwords through their web browser.
  • For one-third of businesses, the owner, president, or MD is responsible for managing company passwords.
  • 16% of non-employees (contractors, freelancers, temps) can access company passwords.
  • 19% of people surveyed said their business uses an automated password generator.
  • 68% of people surveyed say they have heard of the term ‘ransomware.’

The results in full

 

Password Security

A third of participants believe their company’s passwords could be more secure.

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/07/avgbpwsecure

This result isn’t too surprising, considering the most-used passwords in 2015 were ‘123456’ and, you guessed it, ‘password.’

 

Password Storage

72% believe their workplace passwords are stored in a safe place (i.e. not accessible by unauthorized personnel).

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/07/avbpwsecure1

22% of businesses use password management software.

 

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/07/avgbpwsecure2

Small businesses can benefit from using a tool allowing them to securely manage several different accounts simultaneously and store all company passwords in one place. Or a user authentication service, such as AVG Single Sign-On (SSO), lets users employ a single set of log-in credentials—with a two-factor authentication option—to access multiple applications.

 

Logging in

Four out of ten people use the same passwords for different business log-ins.

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/07/avgbpwsecure3

Using one password for multiple services may feel like a time-saver, but it weakens the gateway to your business, data, customers, and potentially your identity. So just imagine if this one password got into the wrong hands. We recommend giving each employee their own password and account, to ensure accountability and improve security.

50% of people use between 1 and 10 passwords to access different networks, software, and accounts.

 

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/07/avgbpwsecure4

Small businesses often use so few passwords because they have a small domain, which combines sign-on for email, network and, other linked services. However, whatever the number of passwords a business uses, they must always:

  • store them somewhere safe,
  • control who has access to them, and
  • ensure the passwords are strong, i.e. contain caps, numbers and symbols.

 

A quarter of participants use two-factor authentication for their passwords.

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/07/avgbpwsecure5

More and more big brands such as Apple, Twitter, and Evernote have introduced the two-factor authentication option, which confirms user identity through a combination of something you have (e.g. an ATM card) and something you know (e.g. your ATM PIN).

 

Password Access

67% claimed there are 1-2 people who have access to their company passwords.

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/07/avgbpwsecure6

IBM’s 2014 Cyber Security Intelligence Index showed 95% of all security incidents involved human error. Successful security attacks happen when human weakness is exploited to lure a company’s employees to unwittingly provide access to sensitive information.

43% of people with access to company passwords don’t have a clause in their contract to keep these passwords confidential.

 

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/07/avgbpwsecure7

Including a confidentiality clause in every employee or third-party contract is an additional—and necessary—layer of protection for your business.

51% of employees save all or some of their passwords through their web browser.

 

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/07/avgbpwsecure8

Using a web browser to remember your password is convenient, but poses a security risk. How big a risk depends on whether you sync with other devices, what browser you use, and how many people have access to your business computer(s) using the same profile. Next time your web browser asks to save your password, reconsider, and select “Never for this site.”

For one-third of businesses, the owner, president, or MD is responsible for managing company passwords.

 

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/07/avgbpwsecure9

When it comes to IT security, small businesses are in a tight spot, because they’re heavily dependent on computers, yet not large enough to have a dedicated IT staff member. So often the owner, president, or MD becomes the closest thing a company has to an infosec expert. As a business grows, so will the IT infrastructure, at which point dedicated personnel should take responsibility for managing company passwords.

 

16% of non-employees (contractors, freelancers, temps) can access company passwords.

For the most part we know and trust our colleagues, so granting system access to full-time employees makes sense. But what about for short-term projects involving a contractor with understandably less of a commitment to the company? Should you really share passwords with these staff? The best solution, if access is essential, is to create temporary log-ins, which you can delete when temporary employees leave. Otherwise, you’re left having to change the password for everyone … or be comfortable leaving it alone, knowing someone who’s left the company technically still has access. And in case it’s not clear, we don’t recommend you ever do this.

 

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/07/avgbpwsecure10

For the most part we know and trust our colleagues, so granting system access to full-time employees makes sense. But what about for short-term projects involving a contractor with understandably less of a commitment to the company? Should you really share passwords with these staff? The best solution, if access is essential, is to create temporary log-ins, which you can delete when temporary employees leave. Otherwise, you’re left having to change passwords for everyone … or be comfortable leaving passwords alone, knowing someone who’s left the company technically still has access. And in case it’s not clear, we don’t recommend you ever do this.

 

Password Generation

19% of people surveyed said their business uses an automated password generator.

 

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/07/avgbpwsecure11

 

The best, easiest way to create strong passwords is to use a password generator.

 

Ransomware

68% of people surveyed say they have heard of the term ‘ransomware.’

 

 

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/07/avgbpwsecure12

However, 36% (101 out of 277) of those who thought they knew what ransomware is actually didn’t.

Ransomware is malware that encrypts your files, then demands payment—often with a time limit—before decrypting them. Not only does ransomware target your most valuable files, it can lock down system files to render your web browser, applications, and entire operating system unusable.

So what do businesses need to know? And what can you do?

Experts warn that small businesses are fast becoming cybercriminals’ favorite target—and those businesses are quite often woefully unprepared. Cybercriminals know that SMBs can be an easy path to a much bigger target, that is your customers and partners. Many breaches could have been prevented with robust employee and contractor education, more stringent password policies, and the use of two-factor authentication.

In 2015, US businesses saw an average 160 successful cyberattacks per week, more than times the 2010 weekly average. Cybercrime globally cost businesses $400-$500 billion last year, and the estimate for 2016 is $2-3 trillion.

In the UK, the latest Government Security Breaches Survey found that nearly three quarters (74%) of small businesses reported a security breach in the last year, an increase from both 2013 and 2014. And the cost of each breach was £75,000-310,800, with 31% being staff-related.

Ultimately, you cannot take it for granted that your employees or colleagues have the tools and knowledge to make the necessary decisions to keep the business secure. But by implementing sound policies and proven practices, you can equip yourself and everyone in your business to be part of protecting it.

And when it comes to IT security and password policies, never, ever, ever underestimate hackers. Where data could be stolen or money could be made, cybercriminals will persist until they find a vulnerability they can exploit. Your password policy is your key to the kingdom, so guard it accordingly.

D&H Distributing Joins AVG Partner Ecosystem

Our AVG Business team is at CompTIA’s ChannelCon event this week, talking with our partners and distributors. We are also excited to welcome D&H Distributing to our AVG channel ecosystem.

 

This week, our AVG Business team is at CompTIA’s ChannelCon event in Hollywood, Florida. This is a great kick off to the second half of 2016 and gives us a chance to meet with our partners and distributors, showcase our AVG Business solutions and talk with channel media.  We are also excited to welcome D&H Distributing to our AVG channel ecosystem.

D&H shares similar values – a partner-focused approach and commitment to driving an effective distribution strategy to deliver new value.  As a leading North American technology distributor, D&H provides a broad range of resources to empower resellers. Known for its multimarket expertise, account-dedicated sales teams, service and flexible financing, the company offers multiple advantages we can extend to our partners and their end customers. Additional advantages of the new relationship include a focus on SMB needs, partner accountability and management, ease-of-doing business, value, performance and premier service.

D&H will provide our full AVG Business product portfolio to its large network of VARs and MSPs throughout the United States and Canada.  This includes our AVG Managed Workplace, AVG CloudCare, AVG Internet Security and AVG AntiVirus Business Edition solutions.

As Jeff Davis, senior vice president of sales at D&H, shared, “We share many synergies with AVG and are excited about the momentum the company is driving through new initiatives focused on channel value. We are commited to providing a robust security offering, and the AVG Business product line offers us tremendous opportunity to execute on this vision for our VAR and MSP community. Products like AVG Managed Workplace and AVG CloudCare are designed and priced with the SMB in mind and offer advanced securiy detection and protection. This is technology innovation and simplicity we can provide across our established footprint as well as help the channel respond to new changes and threats in the security landscape.“

D&H will provide strong value as we continue to strengthen our AVG Business distribution channels to increase flexibility, drive revenue opportunities and help partners take their business to the next level.

Earlier this year, we put several AVG initatives in place focused on driving value for our channel ecosystem – including a new Sales and Marketing model to provide dedicated account support, a Partner Certification Program to deliver on-demand technical training, and a new distribution model to effectively support our partner distribution network. D&H joins several new distributor partners this year as part of this new strategy.

Also key to our distributor model is providing access to specialized, geo-specific distributors to help partners take their business to the next level. To support this localized and specialized approach, we have already onboarded several new distribution partners in the UK, Ireland, the DACH region and North America.  We will continue to work with our large top-tier distributors to complement our model. Our AVG Sales team will remain engaged with our growing partner base while also developing new accounts and relationships within our distribution partner network.

We look forward to sharing more updates.  If you’re attending ChannelCon this year, please stop by the AVG Business booth (#719) – you may even win an iPad Mini 4.  Thank you for your continued support.

AVG Reveals Which of the World’s Favorite Apps Cache in on Your Phone—or Don’t

Latest AVG Technologies App Performance and Trend Report ranks newcomers Snapchat, YouTube and Google Maps among the top 10 Android ‘resource hog’ list, while Netflix is listed as ‘most improved’.

Today, AVG® Technologies (NYSE: AVG), the leading provider of software services to secure devices, data and people, revealed that Snapchat, YouTube and Google Maps are the top 3 apps most likely to drain Android device resources. The AVG Android App Performance and Trend Report H1 2016 outlines, for the period of January through April, 2016, which of the most popular apps had the most pronounced effect on battery, storage and data, highlighting that photo, video and location apps likely contribute most to draining device battery life, in particular.

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/07/pr1/var/www/now.avg.com/18.47.0/wp content/uploads/2016/07/pr2

 

 

 

 

 

 

 

 

 

 

 

 

The H1 2016 report also recognizes ‘most improved’ apps, such as Netflix, previously a top ‘resource hog,’ but which did not make our top 10 charts this time around. Similarly, AppLock, a password protector for smart phones that showed up among the current report’s top 10 battery-draining apps, has improved its performance since this April, indicating that the app’s latest update may have addressed the problem.

In our internal testing of most-used apps’ behaviors, it appears that while Snapchat removes images and videos from conversations, the app’s cache is only partially deleted. We also found that YouTube stores a fair amount of cached files, as much as 270 MB. The remaining apps on AVG’s top 10 lists for H1 comprise mostly similar messaging, video, music and shopping apps—unsurprising inclusions on lists of resource-taxing apps. However, an interesting exception to this pattern is The Weather Channel app, which initiates at start-up (which users likely do not realize), immediately drawing on your network plan.

“Our latest report exposes some quirky app behavior. For instance, I question why a weather app needs to be constantly connected rather than updating on demand,” said Tony Anscombe, senior security evangelist for AVG Technologies. “You could also say that Snapchat’s keeping cached files around undermines its Mission Impossible-esque ‘self-destruct’ approach to messaging. Ultimately, if you have more than a few of these apps or types of apps on your phone or tablet, they could be to blame for those annoyingly regular low battery or low storage notifications.”

The report also highlighted other interesting general app usage trends, including:

  • Today’s average Android smartphone and tablet user has 33 apps installed on their device.
  • The 50 most-used apps include obvious entries, like Android’s own Google Search box or YouTube, but also surprises, such as TripAdvisor, which has increasingly started pushing users from its website to the mobile app.
  • Seven of the top 10 most-used smartphones are 2-4-year-old Samsung Galaxy S phones. Sony Xperia devices make up the remainder of this list.

An all-in-one cleaner and optimizer like AVG CleanerTM for AndroidTM can help keep tabs on the top mobile resource-hogging apps on your devices.

The full report can be downloaded here.

 

Methodology

The AVG App Report was gathered from a sample of aggregated and anonymized data from more than 3 million Android users around the globe. The app data included in this report covers a time period of January 2016 through April 2016 and only includes Google Play applications where AVG observed a minimum sample size of 50,000 usage incidents.

About AVG Technologies

AVG is the leading provider of software services to secure devices, data and people. AVG’s award-winning consumer portfolio includes internet security, performance optimization, location services, data controls and insights, and privacy and identity protection, for mobile devices and desktops. The award-winning AVG Business portfolio, delivered through a global partner network, provides cloud security and remote monitoring and management solutions that protect small and medium businesses around the world. For more information visit www.avg.com.

All trademarks are the property of their respective owners.

 

Media Contacts

Stephanie Kane, Senior PR Director, AVG Technologies

[email protected]

+44 7817 631016

 

Julie Noble, Inner Circle Labs for AVG Technologies

[email protected]

+1 (415) 684-9564

What’s Killing Your Phone’s Performance? Probably 1 (or More) of These 20 Apps

Have unlimited storage, data, battery? Then resume cat videos. But if you get “storage full” messages just before your kid’s solo or a smartphone that dies before lunch, read on.

If you feel like your phone poops out every time you really need it, don’t worry—it’s not you.

We hate to break it to you, but … It’s your apps.

We know, you love them. But it might be time to … take a break, from at least a few.

How can you know, though, which ones are sucking your battery life at the speed of light, devouring your bandwidth, and hogging every inch of space on your Android? AVG’s latest Android App Performance & Trend Report lines up the worst of the worst … and points out who’s cleaned up their act.

By analyzing anonymized data from 3 million AVG AntiVirus for Android users, we’ve done the hard work for you, and now all you need to do to get the most from your phone’s resources is compare your app roster to the lists below (Get the full report).

Top 10 user-run performance-draining apps

This rogues’ gallery highlights those which overall have the highest impact, meaning a combination of all 3 factors: battery life, data use, and storage.

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/07/mobileperform

Notice anything? Spotify, Snapchat, and Outlook, apps that millions of people likely use every day, are in top spots. If you’re nowhere near a power outlet, our advice is simple: avoid using these apps for long periods of time. I myself notice that if I’m using Spotify, in particular, while browsing the web and checking email, that my Android barely makes it though a half-day before shutting down.

Snapchat’s top position was also no surprise. What was surprising was our discovery, during testing, that though the app appears to remove images and videos from conversations, Snapchat actually cached quite a few files. YouTube was also guilty of this, reaching 270 MB just after a couple of days.

Top 10 performance-draining apps that run at start-up

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/07/mobileperform1

Tops spots are held by Facebook and Facebook Messenger, because they continuously check for updates and send notifications. Our advice: Uninstall Facebook apps and use your browser and the web version (www.facebook.com), instead. You may notice that manually checking your feed only when you need to can make all the difference … and not leave you with a useless phone.

The last word … for now

It’s almost funny how the performance of our pocket-sized smartphones has exceeded that of PCs considered high-end just 5 years ago. Yet we’re still bound by 16 and 32 GB built-in storage, data caps, and battery technology that hasn’t improved in ages. Until the smartphone world resolves these issues, we’ll keep on keeping you informed about how you can get the most from your devices, without missing out on what’s so vital (and fun!) about them in the first place.

 

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/07/download button

The Top 5 Pokémon Go Woes … and How to Defeat Them

Are you in danger of not reaching your full monster-snaring potential because of technical glitches? Never fear, fair gamer. I’ve battled the worst problems for you and bring you solutions.

 

While Pokémon Go is clearly a huge (and well deserved) success for Nintendo (and app maker Niantic), with well-thought-out gameplay mechanics, the experience isn’t as smooth as it is with many other Nintendo titles. Users have been complaining of outages, crashes, and frozen screens.

But never fear—you’re not alone. I, too, have encountered Pokémon Woes, and here’s how I fixed them.

1 – “No internet connectivity.”

 

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/07/pgwoe1

You can’t play if you’re not connected. Simple as that. So what’s happening when you get this message? Chances are, Niantic’s servers are at that moment literally being overrun by the millions of users worldwide. With the game’s daily use starting to exceed Tinder’s and Twitter’s (in the US … so far!), no wonder Niantic’s struggling to meet these monstrous traffic demands.

Usually when you get the above message, you just have to wait it out. But you may also have luck with closing and reopening the app. It worked for me many times (I’m not known for my patience). Easy as that.

And if you’re having connection problems while catching a Pokémon, try turning WiFi (or 3G/4G/LTE) off and on again—also worked for me, more than once.

 

2 – “Lost GPS connectivity.”

I literally see this message every hour I play. Again, closing and reopening the app or turning GPS off and on again works wonders. In some cases, a little waiting helps, too, as the GPS problem may disappear on its own.

 

3 – FREEZE!

The game has frozen on me several times, in particular right after I’ve caught a monster. This is especially troubling, since my first thought was, “Wait, did I not actually catch that Pokémon???” But not to worry. Simply restart the app and check your journal. In every case where the game froze on me, once I restarted, I found that the game’s state was successfully saved. Whew!

4 – “Server unavailable. Please try again later.”

If you get this message when your connection is 100% working, then turn off your phone’s GPS, and then try logging in to Pokémon Go. After the game has loaded, turn GPS back on, which should fix the issue.

HOW TO DO IT

  1. Android: Swipe down from the top to get quick actions and notification bar. Tap on Location to turn it off (and later on again).
  2. iOS: Go to Settings, Privacy, Location Services and switch to Off.

/var/www/now.avg.com/18.47.0/wp content/uploads/2016/07/pgwoe2

5 – Missing or incorrect map data

If your avatar is constantly in the middle of nowhere, or streets are displaying as … streets, then you should either delete the app or its cache.

HOW TO DO IT (FOR ANDROID)

  1. Open AVG Cleaner for Android (no worries, it’s free!) and go to Cache.
  2. Tap the CLEAR ALL CACHE
  3. Restart the app!

If that doesn’t work, or if you’re on iOS, uninstall the app, then download it again from Google Play or the App Store to get rid of all leftover (and potentially corrupt) data.

What’s your worst app issue? How’d you fix it? Let us know in the comments!