Tag: blog.avast.com EN

Leading the charge against GuptiMiner

Our Threat Labs recently exposed a highly sophisticated malware operation known as “GuptiMiner”, which targets corporate networks specifically. Our team of experts got into research mode right away! This article has been indexed from blog.avast.com EN Read the original article:…

IRS scams: How to avoid getting tricked

Tax season is upon us, and you know what that means: It’s time for IRS scams to start showing up. These scams take the form of anything from phishing emails to fake phone calls — and they can be difficult…

AI-generated deepfakes and investment scams

Financial scams are like that one guest at the party who just won’t leave, constantly evolving and finding new ways to crash our digital lives. Lately, they’ve taken a turn for the futuristic with AI-generated videos popping up in investment…

Spoiler: It’s not the IRS calling

Have you ever gotten a call from the IRS? If you have, then you might be one of the thousands of people losing millions of dollars every year to IRS scam calls. These fraudulent calls, which claim to be from…

W-2 phishing scams: Everything you need to know

It’s that time of year again – tax season – and, unfortunately, it’s also a peak time for phishing scams. Cybercriminals know that people are more likely to be filing their taxes and sharing sensitive information online, so they increase…

Watch out! There are hidden dangers lurking your PDFs

PDFs have become synonymous with convenience and reliability, serving as the backbone for our document-sharing needs. Whether for work, school, or personal use, their ability to maintain formatting across various platforms has made them indispensable.   This article has been…

Unveiling the truth behind AI relationship chatbots

AI romantic partners have been a thing in popular culture since at least the 1960s. From full-on android robots like “Rhoda Miller” in My Living Doll to the disembodied voice played by Scarlett Johansson in 2013’s Her, we’ve been collectively…

How to spot the bad actors this awards season

Lights, camera, action! Award season is a time to celebrate the shows, the crews, and, of course, the performers. But for these actors, their stage is the world of cybersecurity, where they put on the most thrilling performances of the…

That new X cryptocurrency? It’s a scam.

In the dynamic landscape of online scams, our Avast team has identified a new and bold scam, using the likeness of Elon Musk. This quarter, we uncovered advertisements featuring Musk to promote a supposed new cryptocurrency. The irony is striking…

Uncovering the hidden superpowers of your smartphone

Picture this: You’ve just dashed out of your favorite café, already late for a meeting, when that heart-sinking realization hits you: your phone isn’t in your pocket where it should be. Panic kicks in. Or maybe you’re entering your card…

Is your ID badge giving away too much about you?

It seemed like an innocuous thing to do. Before flying home to Australia from Japan, Tony Abbott posted a photo of his boarding pass on Instagram with a message thanking the Qantas Airlines crew. But the well-intentioned gesture triggered a…

Are you sure that online store is real? You might be surprised

The surge in online shopping has unfortunately paved the way for numerous internet frauds. Cybercriminals are craftily establishing phony online boutiques, offering an array of products from trendy apparel to high-tech gadgets, and occasionally, even pets. The rise of user-friendly…

How To Protect A New Technology Purchase | Avast

The holiday season often brings the excitement of receiving or gifting the latest tech gadgets, from smartphones to laptops and internet-connected devices. The thrill of starting with a brand-new device, free from smudges and clutter, is unmatched.   This article has…

Holiday Season Online Privacy Recipe | Avast

If you are going online this holiday season (and let’s be real — we all are), then you’ve seen the notice urging you to “accept all cookies.” Have you ever wondered what that means? You’re not the only one! Since…

AI is fueling a surge in TikTok scams

TikTok has emerged as a fertile ground for financial scams, specifically those involving cryptocurrency. The platform’s wide reach, coupled with its appeal to younger audiences, presents an attractive prospect for malicious actors aiming to exploit unsuspecting users.    This article has…

Fall back…into some good digital health habits

Fall is here, and along with cozy sweaters, family gatherings, and PSLs, comes the tradition of turning the clocks back as Daylight Saving Time (DST) ends. Although we’re not certain why this practice lives on in 2023, it lends itself…

RATs, rootkits, and ransomware (oh my!)

In a vast world of online threats, certain terms can stand out for their mysterious nature and vague implications. They sound technical, jargony, and are often dismissed as too hard for us to get into. Today we’re offering a guide,…

What is Digital Identity? | Avast

They say everyone is likely to have a living, breathing Doppelganger. Whether you believe that or not, this is for certain: if you’ve ever used the internet to do something as simple as create an email account or social media…

Web-based adware’s crafty games and how to sidestep them

If you’ve ever been online (and, well, you’re here, so obviously you have), you’ve probably crossed paths with something called web-based adware. Let’s take a moment to unpack that.  This article has been indexed from blog.avast.com EN Read the original…

New Report Finds Shift in Cyber Crime | Avast

Something is changing in the world of cybersecurity. In the first half of 2023, Avast researchers observed a notable shift in threat trends. While traditional consumer-focused cyber threats experienced a slight decline, social engineering, and web-related threats, such as scams,…

The 3 Cs of Renting vs Buying Ebooks | Avast

Well, it’s that time of the year again: Students are scrambling to find the cheapest version of their textbooks they can. And with textbook prices being as high as they are, most of us usually decide to just take the…

Ebooks are cheap, but you might pay in other ways

The practice of buying textbooks is practically a scam itself. Spending hundreds of dollars twice a year for books that you’re not even guaranteed to use? No wonder so many students try to find cheaper alternatives.  This article has been…

A fan-made Mario game says ‘Lets-a-cryptomine’

The world’s most iconic plumber has been spotted as the subject of a fan-made video game that’s widely available for download across the internet—but keep reading before you go to download it.   This article has been indexed from blog.avast.com EN…

The hidden pitfalls of travel apps

Any seasoned traveler will know just how just how many single-use apps are downloaded over the course of an average vacation. These days, everything from watching movies on the plane to checking into your hotel or accessing your tickets to…

Avast researchers uncover disturbing crowdfunding scheme

The landscape of cybercrime is vast and constantly evolving, and cybercriminals are always coming up with new and novel ways to manipulate people. Avast’s cybersecurity researchers recently uncovered one such scheme, which involves a crowdfunding scam that preys on the…

Protecting your business: Advice to SMB CEOs from a former CIO

The acronym CIO is sometimes understood to stand for “Career Is Over,” and here’s why: Business leaders in charge of information technology are not only tasked with driving automation, productivity, business intelligence, digitization, and cloud platforms, but often also with…

AV-Comparatives reveals top anti-phishing solutions

In the first quarter of 2023, phishing attacks made up 31.98% of all threats blocked by Avast. Despite this significant number, there remains a lack of tests evaluating how anti-malware software and browsers protect users against phishing threats. That’s why…

SMB cyber safety: De-risking catastrophic events

September 15, 2008: The bankruptcy of Lehman Brothers triggers a 4.5% one-day drop in the Dow Jones Industrial Average, then the largest decline since the attacks of September 11, 2001.   This article has been indexed from blog.avast.com EN Read…

How to fortify your cryptocurrency security

In today’s uncertain economic climate, people are searching for alternative ways to invest and store their money. With high inflation rates during the last month and yet another crisis in the financial system, one option that has gained significant popularity…

Digital Home Hygiene Checklist | Avast

With any spring cleaning project, a checklist can help you remember all of the essential tasks for organizing, decluttering, and maintaining your physical home. The same is needed to keep your digital home spotless and secure. This article has been…

Anti-malware tests: How to interpret them

It can be overwhelming navigating the world of anti-malware software. With so many different products and test results out there, it can be difficult to know which one to choose in order to keep your computer and information safe. With…

2FA: Why to use it — and what are the best options?

In today’s digital age, it’s essential to protect your online accounts from hackers and cybercriminals. Unfortunately, the traditional method of protecting an account with just a password is still used by the vast majority of people. With the number of…

Cyber spring cleaning: Maintaining your digital home

Spring cleaning prompts many of us to refresh and reorganize our homes with an initial burst of enthusiasm. However, it’s the required maintenance that most of us falter on. So, much like for our physical homes, committing to a year-round…

Cyber spring cleaning: Decluttering your digital home

Spring cleaning provides the perfect opportunity to declutter both your physical and digital homes. Although digital clutter doesn’t leave a physical trace, it can undoubtedly take up significant mental space. A messy digital environment can trigger stress, hinder productivity, and…

Life finds a way: OneNote malware on the rise

Macro viruses have been a security nightmare for years. First appearing in 1995, they didn’t start gaining global popularity until 1999, when the Melissa virus showed up. Melissa virus was distributed via email attachments, and it quickly became the most…

AV-Comparatives Anti-Phishing Test | Avast

If an antivirus is doing its job, you never really have to think about it. It should be running in the background, protecting your devices from all types of attacks. But if that’s the case, how do you know it’s…

New Instagram scam uses fake SHEIN gift cards as lure

Avast researchers have detected a new scam targeting Instagram users from various countries including the UK, Australia, France, Spain, and Poland.  This article has been indexed from blog.avast.com EN Read the original article: New Instagram scam uses fake SHEIN gift…

Cyber spring cleaning: Organizing your digital home

Spring cleaning season is among us, and that means tackling overstuffed drawers, orderless cabinets and overflowing closets. It’s time to tidy upthose neglected spaces not only in your physical home but in your parallel digital home as well. And we…

(Ab)using Adobe Acrobat Sign to distribute malware

Bad actors have been distributing malware through email for decades. Over time, security technology has evolved and improved greatly, making this task harder for cybercriminals. 20 years ago, we witnessed the frequent distribution of email worms, which caused inboxes to…