How to detect and remove a virus from your Android phone

How to detect and remove a virus from your Android phone Android malware comes in all shapes and sizes; here’s how you can defend your smartphone against it. Previously in Part 1 of The Avast Guide to Android Apps, we covered all the common malware and how to deal with it. In part 2 of our […]

Continue reading

Could smart speakers undo your smart home?

Could smart speakers undo your smart home? Avast Security Researcher Martin Hron explains why your smart speakers may be the next big target. Juniper Research predicts that by 2022 more than half the homes in the U.S. will contain smart speakers like today’s popular Amazon Alexa and Google Home, and it’s easy to see why. […]

Continue reading

How to tell if an Android App is safe to install

How to tell if an Android App is safe to install The Avast Guide to Android Apps Part 1: This guide teaches you how to identify malicious apps and keep them off your Android phone. By now, you should be familiar with that sudden bout of uncertainty as you are gearing up to install a […]

Continue reading

Important Notice: End-of-support for Windows XP and Vista

Important Notice: End-of-support for Windows XP and Vista Avast Business Endpoint Protection v.19 will only support Windows 7 or later. In early 2019, Avast Antivirus client version 19 will kick cybersecurity to the next level. We will be releasing it throughout our home and business products. Avast Antivirus client version 19 will NOT be compatible […]

Continue reading

Denial: why do small businesses turn a blind eye to their biggest threat?

Denial: why do small businesses turn a blind eye to their biggest threat? A psychologist explains how and why businesses lock their doors and keep money in the safe, but ignore cyberthreats that could ruin them. “You can lead a horse to water,” says Doctor Lee Hadlington, Associate Professor of Cyberpsychology at De Montfort University […]

Continue reading

The Data Breach Survival Guide

The Data Breach Survival Guide Here’s what you need to do if you’ve been involved in a data breach. Over the past year, have you done any online shopping at Macy’s, Sears, Kmart, or Adidas? How about any in-store shopping at Lord & Taylor, Forever 21, or Saks Fifth Avenue? Have you eaten at Panera […]

Continue reading

New zero-day vulnerability found in Windows

New zero-day vulnerability found in Windows A previously unknown bug, if exploited, allows potential hackers to take over the system. A Twitter user named SandboxEscaper posted, quite colorfully, on social media yesterday about a newly-discovered security flaw in Microsoft Windows. While the vulgarity-laced tweet has since been deleted, the zero-day Windows vulnerability has been authenticated […]

Continue reading

Atlas Quantum breach affects 261,000 users

Atlas Quantum breach affects 261,000 users The cryptocurrency investment platform suffered a data breach over the weekend affecting all its users. Over the weekend, cryptocurrency investment platform Atlas Quantum reported it had suffered a data breach that compromises the personal info of 261,000 users. As of yet no funds have been stolen from any accounts. […]

Continue reading

Will you still need a VPN with WPA3?

Will you still need a VPN with WPA3? WPA3 will greatly improve router security, but it will not replace your VPN. Behold, the dawn of WPA3! Well… actually, there’s nothing much to see yet. The Wi-Fi Alliance just last month started certifying products that support the new security protocol. It’s going to take time for […]

Continue reading

Fake app infects your Android with spyware

Fake app infects your Android with spyware An ongoing Android malware campaign called Triout is recording calls, collecting photos, and reporting your location. In 2016, an app called “Sex Game” was available in the Google Play store. And while it was legitimate, the bluntly titled app did not last long in the store. Soon it […]

Continue reading