Tag Archives: Social Media

Experienced Social Media Ninja wanted!

Take care of Avast Communities &  A-team!

social nijna

At Avast we are convinced that our Community of 5 million fans and followers deserve our full attention.

Therefore, we have a dedicated social media team that creates, monitors, and participates in conversations across social media, engaging with AVAST users, journalists, and key influencers. We blog, tweet, pin, simply do what all Social Media Ninjas should do, in order to earn the title Ninjas! One of us is leaving, to take care of a newly-arrived little Ninja, therefore we are looking for someone who can join our Social Media A-Team! ;) 

Avast Social Ninja should be :)

  • Experienced and multi-functional community manager: Monitor, prioritize, respond, and assign conversations across all of AVAST’s 20 social media touch points!
  • Able to assist our local social media community managers: Monitors trends, tools, and new techniques, so you can support and guide our local managers through the social media jungle!
  • Creative story-telling via short-form content and blogging is your weapon, and you know how to play with words!
  • Focused and capable of planning ahead.
  • Be able to manage Social Media campaigns and report results to the Master of Ninjas!

Perfect Ninja should :)

  • Prove at least 2 years experience in the Social Media ring.
  • Be flexible and focused on the users’ needs. Understanding that our American, French, Russian, German, etc. communities require different approaches is crucial! 
  • Understand that Social Media Ninjas fight together. Work closely with communications, marketing, support, and product teams.
  • Be tech savvy enough to know that the AVAST Virus Lab doesn’t create new viruses, phishing doesn’t use worms for bait, a false positive isn’t positive for Avast or our users. Basically you need a working knowledge of online and mobile security!
  • Fluent in English (written and spoken) is a MUST. Any other language is a plus (Japanese will give you extra points. :) )

What you can expect from us?

  • Great, unique experience in social media, lots of fun, space for creativity, and new ideas!
  • Fantastic team atmosphere and close cooperation within our international environment with Deborah (American, currently in Florida, USA, before living in China, Finland), Albert from Spain, Anna from Russia, Andre from Brazil, Dominika from Czech Republic, Sarah from France!
  • Working in the AVAST HQ in Prague, one of the most beautiful cities in the world.
  • Plenty of benefits that all Ninjas like: Flexible working hours, lunch vouchers, 5 weeks of vacation, sick days, language courses, training, pension insurance.

What won’t happen to you:

beth

Challenge accepted? :)

Send us your CV, link to your blog, Twitter profile, Google +  and a letter explaining why you ARE THE ONE at [email protected] or [email protected]

Last, but not least, follow us on Facebook, Twitter and Google+. Business owners – check out our business products.

LinkedIn: How to avoid being scammed

secure linkedin

Nowadays, practically everyone has a profile on LinkedIn. This is a useful tool for letting companies know who you are, your work experience, your present position and the best way to contact you. Along with other personal details, it is common to include an email address.

Yet despite these benefits, the platform also has its drawbacks, at least when it comes to security. The tool is not only useful for human resources managers, but also for spammers and cyber-criminals on the lookout for email addresses to which to send fraudulent messages.

More often than not, the real target of these attacks is not the owner of the email account, but the company where they work, and its data. For a cyber-criminal, this social network is like an address book containing the company email addresses of thousands of users, who use these addresses instead of their personal ones for any professional business.

Once they have found several accounts with the same company name, they make a note of the address structure (usually [email protected]). Then, with a slightly more refined search, they can get a list of all employees’ email addresses.

linkedin panda security profile

 

If the hacker knows the structure of the network that the company uses, they can access the system by sending an email to the employees in their address book. This mail might include, say, a link to a page where the recipients are asked to enter the username and password to access the organization’s platform. Once they have them, they have free reign to spy on internal information.

Those often excluded from the attack are the IT department, as they might rumble what’s going on. However, customer services, marketing, accounts, and human resources are much more attractive targets for hackers.

If the criminals manage to enter the systems, this is just the first step to getting other type of information: personal details, account numbers, passwords and databases can all be compromised.

linkedin profile

Companies often encourage employees to have a presence on Linkedin. Yet saying where they work, looking for new customers and employees and increasing brand visibility on the Internet has its risks.

How to keep unwanted messages out of your professional inbox

  • Stay up-to-speed on IT security. It’s a good idea to go on courses or for companies to organize workshops. If employees can recognize scams it can help prevent them from falling into the traps set by criminals.
  • Employees should be clear about what kind of data they will be asked for on the company’s ICT platforms so as not to enter personal information on external websites. Recognizing the email account used for internal memos is also a useful aid for distinguishing suspicious messages.
  • Another thing you should consider when protecting your company (and also yourself) is to understand the mechanisms that are available to alert technicians to any strange items. IT managers can also play their part, warning about the importance of these actions. A timely warning can prevent someone from clicking a fraudulent link or revealing personal data.
  • Use a personal email account in LinkedIn. This makes it more difficult to identify, although the same advice still applies: don’t open emails from unknown senders, don’t click on the links to unknown content and be careful where you enter your data.

The post LinkedIn: How to avoid being scammed appeared first on MediaCenter Panda Security.

How to identify the warning signs of work-from-home scams

howto2_enHome-based jobs are attractive to people who are looking to supplement their regular or retirement income, those who want part-time employment, or those who want to save money on child care or gas. Many people have dreams of being entrepreneurs and working independently of traditional businesses. Cybercrooks take advantage of this to create fake offers for work-from-home opportunities.

Sharp-eyed avast! Facebook fan, Timothy B., shared a post that he received for a work-from-home scam.

Facebook work from home scam 1

 

The post says,

Good morning Facebook ready to start my day and start looking for 9 people that are very serious in wanting to change their live around financially who want to be there own boss?who want to work when they want ?who wanna make an extra $500-$2000 every week from home ?who serious enough to take the risk of $40 to change there life around ?yes with $40 you can how? Inbox me for more information

Work-at-home and get-rich-quick schemes have been around for a long time, first appearing in people’s real mailboxes, on TV, and in magazine advertisements. Cybercrooks have created variations of this scam to harvest email addresses and contact lists from Facebook. Social networking makes it easy to create fake profiles and identities quickly.

The grammatically-challenged swindler from Timothy B.’s newsfeed entices potential victims with the ease and flexibility of working from home whenever they want. The message promises big earnings, and all you need to do is make a $40 investment to find out how. This scammer will most likely try to get you to wire money and then collect your personal information.

Warning signs of a work-from-home scam

  • No business name or contact address – No legitimate company will advertise for jobs without stating their name, brand identity and physical contact address.
  • You’re required to pay a fee for additional information. Legitimate employers don’t charge a fee to hire you or to get you started. Don’t send money for directories or start-up kits.
  • Promises of exceptional earnings.
  • Claims that no experience is necessary or resume is required.
  • Asks for personal information like a Social Security or bank account number over the Internet.

How to report a scam

File a report with the Internet Crime Complaint Center – In order to file a report, you’ll need to provide the following information:

  • Your name, mailing address, and telephone number.
  • The name, address, telephone number, and web address, if available, of the individual or organization you believe defrauded you.
  • Specific details on how, why, and when you believe you were defrauded.

Report the company to the Better Business Bureau (BBB) – If you have a company name or web address, use the BBB’s search tool to find out if there have been complaints filed. You can file your own complaint online.

Report spam on Facebook – The best way to report abusive content or spam on Facebook is by using the Report link that appears near the content itself. To report something someone posted on your Timeline:

  1. 1. In the top right of the post, click the down-pointing arrow
  2. 2. Select I don’t like this post
  3. 3. Select I think it shouldn’t be on Facebook and follow the on-screen instructions

Thank you for using avast! Antivirus and recommending us to your friends and family. For all the latest news, fun and contest information, please follow us on Facebook, Twitter and Google+. Business owners – check out our business products.

AVAST celebrates International talk like a Pirate day

Ahoy, me hearties!

Today, the AVAST crew is participating in one of the goofiest events in the world: International Talk Like a Pirate Day! Did you know thtalk-like-a-pirateat there is a Pirate language and that AVAST is one of the key words of the language? You can even set up your avast! Antivirus in Pirate language and change your sound notifications to pirate language! How we are participating?

Th’ wenches ‘o Social Media ‘n HR, along wit’ a few scurvy dogs, have planned a right jolly day ‘o piratey hijinks fer th AVAST pirates. Every hour when th’ bell chimes, a new task is assigned. The treasure hunting has finished and prizes given away.

Th’ best scurvy pirates come from AVAST!

Our team received seven tasks in different categories to challenge geeky and creative minds. The response was great and we are sharing with you only a fraction of what has been happening here. :)

Jolly good idea ya social media ‘n HR wenches, garrr!

But run out of rum and you walk the plank! ~ Jan, accounting department

 

Avast who is coming next

you will need your pirate vest.

Hide your hook and say ahoy

to not scare this little boy :D ~Pavla  Marketing

 

Ya lazy bums, hurry and up,
avast! they come, our blood thirsty foes,
let’s cut their throats with our smart codes
ahoy! we’ll grab, the scavengers boats!

One more yer’old powder monkeys!

The floor is dirty and supplies are rotten,
but we keep on sailing, we won’t be forgotten,
we rockin’n’surfin’n’fixin the mast,
we are the sailors working for Avast! ~ Tomas, BI

 

Advance, ye mates! Cross your lances full before me. Let me touch the axis and drink thy rum, ye harpooneers! ~ Andre e-commerce

 

IMG_20140919_105419
IMG_20140918_145551
IMG_20140918_140312
IMG_20140919_110113
IMG_20140918_141241
IMG_20140919_101443
IMG_20140919_104043
IMG_20140919_104257

 

 

A pirate ship named Avast,boat

Was sailing accross the sea,

The sailors organized a party and had a blast,

But the Captain was pissed as his glass was empty,

Where did all the rum go?

Where did all the rum go?

Arrrgh, the Captain was complaining over and over,

They will all be hangover! ~ Sarah e-commerce

 

Ahoj sailors developers!

I see some red,logo 6

Better when green,

Oops it’s again red,

Now code is clean,

And #TDD is great!

Code is poetry when #coding at Avast ~ Jonas BI

logo 1
logo 3
logo 5
logo 4
logo 7
logo 2

 

Malware are #FF0000

AVAST is the #FF9900

All my rums are belong to you!

ARrrrr!

01000001 01010110 01000001 01010011 01010100 ~ Nikolas, virus lab

 

Avast! Bloody Avast! Hey,
Pirates gonna crunch the bay.
Jump, shot & sink the boats.
Down the sea of rum & dry throats. ~ Pavel BI

Thank you for using avast! Antivirus and recommending us to your friends and family. For all the latest news, fun and contest information, please follow us on Facebook, Twitter and Google+. Business owners – check out our business products.

Avast, me hearties! Today is Talk Like a Pirate Day!

This day be a jolly day to be a scurvy pirate!

 

AVAST celebrates International Talk Like a Pirate Day

Celebrate all things pirate by installing a pirate-themed voice for your avast! Antivirus products. Download and install it from our Facebook avast! Voices tab and all yer antivirus alerts will henceforth be in a pirate voice. Go to avast! Voices on our Facebook page and choose Themed>1-pirate.mp3>Download Voice.

International Talk Like a Pirate Day started after syndicated columnist and author,  Dave Barry, mentioned a group of zany guys who liked to talk using pirate lingo. Years earlier, these guys decided to start their own Talk Like a Pirate Day and make it a national holiday on September 19th.  Trouble was, no one knew about it. But in 2002, when Dave Barry wrote about the fledgling holiday, it was a breakout success.

Since the name of our company, AVAST, also means stop or desist, as in “Avast, ye landlubbers!”, it made sense for us to be a part of the celebration.  Jezebel, the Webwench from the Talk Like a Pirate’s Day crew declares,

avast! Antivirus software  is the official AV protection of at least one-quarter of the Talk Like A Pirate Day crew. I installed the pirate voice and I LOVE IT SO MUCH, mate!

So join th’ ruckas this day, ‘n install th’ scurvy pirate voice on ye avast! Antivirus. Like our avast! Facebook page, click the avast! Voices tab and Talk Like a Pirate!

Thank you for using avast! Antivirus and recommending us to your friends and family. For all the latest news, fun and contest information, please follow us on Facebook, Twitter and Google+. Business owners – check out our business products.

 

How to make your social media accounts (almost) unhackable

Now more than ever, its important to make sure your social media accounts are safe and secure. Here are our 6 top tips to make your social media accounts almost unhackable.

The post How to make your social media accounts (almost) unhackable appeared first on We Live Security.

How Twitter aims to prevent your timeline from filling up with spam

As with so many of today’s technological tools, while many people use them to make their lives easier, or to keep in touch with friends and family, there are some that take advantage of them simply to annoy others.

So while most of us use social networks to chat with friends, meet new people and keep abreast of what’s happening in the world, there are those that saturate our accounts with messages that are not just of no interest, they are downright annoying: the infamous ‘spam’.

Now, tired of users having to endure this continuous bombardment of unwanted advertising, those responsible for several social networks have decided to go on the offensive. One of these is Twitter, which has taken action as spammers have been increasing their unhindered presence on users’ timelines and direct message inboxes. Finally, those in charge of the social network have said enough is enough.

twitter spam

As the company has revealed on its blog, over the last six months its developers have been working on the design of a system that can detect and block the actions of these annoying spammers. They have called it ‘BotMaker’ and its objective is to counter the actions of those who, whether for commercial reasons or otherwise, are dedicated to annoying other users of the social network.

The plan that Twitter has come up with to prevent these unwelcome users from doing whatever they please has three objectives.

  1. Firstly, it aims to reduce the options for spammers to create content.
  2. Secondly, it wants to restrict the visibility of spam messages launched on the social network.
  3. Finally, the most difficult objective is to reduce reaction times between spam attacks and the system’s ability to detect and stop them.

To achieve its aims, BotMaker has been designed to apply a series of rules that allow it to determine who is annoying other users with spam. When there is a suspicion that a tweet breaks the rules on spam, Twitter’s new platform will activate a protocol to ensure that either the message is deleted immediately or the user that sent it is vetoed to prevent them from further annoying users.

twitter no interest messages

Moreover, to prevent any unwanted messages from bothering other tweeters by trying to sell something, Twitter’s newly devised anti-spam system includes different bots that act at different stages of the hunt for spammers. The first to come into play is Scarecrow, which intervenes immediately in real time. Sniper comes next, eliminating any spam messages that have slipped past the previous filter. It also carries out a second appraisal and makes a record of suspicious users. If this weren’t enough, BotMaker also sets certain controls on users over long periods of time to prevent them from getting around the rules.

Nevertheless, the main advantage of Twitter’s new system is that it can detect spam even before the account in question can send junk mail to other users. This was the biggest challenge that the team at the social network faced because, whereas with email the delivery is delayed for a few seconds while Google or Microsoft robots check it to ensure it is not spam, with tweets this isn’t the case. These messages are sent and, theoretically, should arrive on your timeline immediately.

Users are also involved in the successful operation of BotMaker as they have the chance to identify those accounts that are flooding their timelines with spam. In this regard, the cookies that users have to accept to use Twitter also play an important role, by analyzing the traces left by tweeters. Despite this, BotMaker has no negative effects on users whatsoever. In fact, the system has been configured not to interfere with the bots that users install to automatically tweet on those topics that they have previously selected.

twitter unwanted messages

Trails carried out by the company with BotMaker have shown it to work efficiently. In the six months that Twitter tested its own invention, it managed to reduce by 40 percent the billions of unwanted messages aimed at selling or promoting products to other users of the social network.

Yet although these results may seem encouraging for those who regularly use Twitter, the truth is that all is not what it seems. Beyond its firm desire to counter the intentions of spammers, the social network is also striving to improve its own targeting of advertising.

As the epicenter of thousands upon thousands of comments about all types of events taking place around the world, the filters that BotMaker uses can also be used to select users who may be interested in advertising of one product or another.

More | How to protect your Twitter account

The post How Twitter aims to prevent your timeline from filling up with spam appeared first on MediaCenter Panda Security.

Facebook offers a new tool for configuring privacy

privacy facebook

As Facebook is always changing, keeping your profile private and secure is a complicated and time consuming task. The social network therefore, aware that this could put many users off sharing their news with contacts, has developed a new tool to simplify the job.

With this new feature, a friendly blue dinosaur helps you to quickly and simply check which of your contacts can see your latest posts.

To access it you have to click the padlock symbol in the top right of the screen and select “Privacy checkup

facebook privacy check - up

A dialog box then opens with three simple steps.

How to configure privacy settings in Facebook

  1. The first option lets you control who can see your posts when you update your status from the news section or from the wall. As well as telling you the current settings, you can also change them to suit your preferences

facebook privacy check - up posts

  1. The next step displays a list of all the applications that can access your profile and information. Here you can also prevent this access if you no longer use the application in question. What’s more you can see which of your contacts can see posts that the applications publish ​​in your name.

facebook privacy check - up apps

  1. Finally, Facebook helps you check which personal information you’re sharing on your profile: your job, school and college background, where you live … you can add or delete data and restrict access to it.

facebook privacy check - up profile

Although none of these settings prevent Facebook from using your personal information for advertising, it can help you know which contacts can see which posts.

At present this help feature does not include settings for albums or photos as a profile or homepage, which you will have to check directly.

If after meeting Facebook’s new dinosaur you still have questions about the privacy settings of your profile, you can always check our guide.

More | Facebook Privacy Guide

 

The post Facebook offers a new tool for configuring privacy appeared first on MediaCenter Panda Security.

avast! Mobile Security quiz winners!

AVAST recently surpassed a major milestone:  More than 100 million downloads of avast! Mobile Security & Antivirus for Android.

To celebrate the phenomenal popularity of avast! Mobile Security, we organized a test-your-knowledge quiz on our popular avast! Facebook page. Our goal was not only to test your knowledge and award participants, but also bring your attention to and educate users about mobile security. Our knowledge quiz wasn’t easy, but we made sure that you received a hint to answer the questions correctly. Thousands of you submitted answers to our 5 questions as well as shared your thoughts about what the greatest threat to mobile security is today.

Here are the quiz questions and answers:

  • How many Smartphones are lost or stolen every minute of every day?  The correct answer was 100! The answer was found in this blog post.
  • avast! Anti-theft helps you locate your lost or stolen mobile device. There are various methods used. Which of following is NOT one of the methods? The correct answer was ‘Communicate via your GPS device.’  The hint was hidden in this blog post.
  • Based on users’ answers in an AVAST survey, which group of people are more vulnerable to mobile malware? The correct answer was ‘Males.’ The answer was found in this infographic.
  • When was the first version of avast! Mobile Security released? The correct answer was ‘December 2011.’ The hint was hidden in this YouTube video.
  • The AVAST team demonstrated our Mobile Security product at one of the largest mobile conferences in the world. In which great city did it take place?  The correct answer was ‘Barcelona.’ The hint was hidden in the following blog post.

BLOG-en

Here are the results:

  • 2,400 participants answered all the questions correctly
  • 1,900 participants answered four questions correctly
  • 1,400 participants answered three questions correctly
  • 3,300 participants answered one or two questions correctly

We promised to give away 1,000 Premium licenses to participants. However, we changed our mind. We decided that we want to protect your Android phone and tablets, so we well be awarding everyone who answered 3 and more answers correctly with a  free license for the most trusted Android security product in the world! :)

Now check your mailbox and search for the email from us. It will contain a special voucher with instructions on how to activate your Premium license. It might end up in the Junk/Spam folder, so please make sure you double check it too. In the following blog post we will announce winners of our VIP #AVASTteddy and the lifetime license, so please stay tuned!

For those who didn’t succeed this time, we have also something.  Install avast! Mobile Security and Antivirus for FREE from the Google Play store, https://play.google.com/store/apps/details?id=com.avast.android.mobilesecurity

Thank you for using avast! Antivirus and recommending us to your friends and family. For all the latest news, fun and contest information, please follow us on Facebook, Twitter and Google+. Business owners – check out our business products.