Bad actors have been distributing malware through email for decades. Over time, security technology has evolved and improved greatly, making this task harder for cybercriminals. 20 years ago, we witnessed the frequent distribution of email worms, which caused inboxes to…
Tag: blog.avast.com EN
Stalkerware has grown by 239% worldwide over the past three years
Over the course of the past three years, Avast researchers have discovered a diverse range of mobile applications intended for non-consensual stalking. This article has been indexed from blog.avast.com EN Read the original article: Stalkerware has grown by 239% worldwide…
Introducing Avast One Platinum
Like great home security systems, great cybersecurity is largely invisible. You want it to do its thing, running in the background, silently protecting you and your family. The only time you should be aware of it is when something goes…
How to safely file your taxes online
As tax season approaches, many people are starting to think about how they will file their taxes. If you’re like most people, you’re probably considering filing your taxes online. It’s convenient, fast, and can save you a lot of time…
IRS scams: How to avoid getting tricked
Tax season is upon us, and you know what that means: It’s time for IRS scams to start showing up. These scams take the form of anything from phishing emails to fake phone calls — and they can be difficult…
Best Practices for IT Service Providers | Avast
With the world expected to lose $10.5 trillion annually to cybercrime by 2025, many businesses are working to boost their IT security. Managed service providers (MSPs) are uniquely positioned to help SMBs protect against the biggest cyberthreats they face today.…
How to protect yourself against identity theft this tax season
Filing your taxes is already a drag, but finding out that someone has already filed a fake tax return in your name and is trying to steal your refund? That just takes the cake. This article has been indexed from…
Spoiler: It’s not the IRS calling
Have you ever gotten a call from the IRS? If you have, then you might be one of the thousands of people losing millions of dollars every year to IRS scam calls. These fraudulent calls, which claim to be from…
Is your online date Googling you?
There’s an old joke that “On the internet, nobody knows you’re a dog.” It’s originally from a 1993 cartoon in The New Yorker and while the internet looks a lot different from how it looked back then, it’s just as…
Taylor Swift ticket scams: How to stay safe
You’re a confirmed Swiftie: You love Taylor Swift and can’t wait to see her perform live. With each new tour, you’re eager to get your hands on tickets to experience the magic of seeing Miss Americana live. But Swifties aren’t…
Spoiler: It’s not the IRS calling
Have you ever gotten a call from the IRS? If you have, then you might be one of the thousands of people losing millions of dollars every year to IRS scam calls. These fraudulent calls, which claim to be from…
Is your online date Googling you?
There’s an old joke that “On the internet, nobody knows you’re a dog.” It’s originally from a 1993 cartoon in The New Yorker and while the internet looks a lot different from how it looked back then, it’s just as…
Smishing: The elephant in the room
Phishing is undoubtedly one of the most popular ways for cybercriminals to start a malicious attack, whether they’re looking to steal someone’s identity or distribute malware. Since the emergence of phishing, this attack vector has only been growing — and…
Tax-related identity theft: How to protect yourself
As the tax season approaches, it’s important to be aware of the potential for tax-related identity theft and scams. Unfortunately, these types of crimes are all too common, with scammers using various methods to steal personal information and commit fraud. …
Super Bowl ticket scams: Security tips for football fans
The Super Bowl is one of the most popular and highly anticipated events in the world of sports. Each year, millions of fans flock to the host city to witness the biggest game in American football. But, unfortunately, the hype…
Avast Threat Labs Q4 2022 Threat Report | Avast
The Avast Threat Labs Q4 2022 Threat Report observed a rise in social engineering attacks during the final quarter of 2022, including invoice and refund fraud, tech support scams, and others aimed at stealing money. Cybercriminals continued to engage in…
10 Tips for Securely Filing Taxes Online | Avast
Filing your taxes online can be a convenient and efficient way to get them done, but it’s important to be aware of the potential risks. For example, online filing potentially opens your personal information up to exposure in a data…
Online Dating Safety Tips | Avast
With Valentine’s Day looming on the calendar like a pulsing red heart, the online dating world is sure to experience a flutter of activity. But it’s not just lonely hearts who are flocking to the dating sites – unfortunately, predators…
Super Bowl ticket scams: Security tips for football fans
The Super Bowl is one of the most popular and highly anticipated events in the world of sports. Each year, millions of fans flock to the host city to witness the biggest game in American football. But, unfortunately, the hype…
W-2 phishing scams: Everything you need to know
It’s that time of year again – tax season – and, unfortunately, it’s also a peak time for phishing scams. Cybercriminals know that people are more likely to be filing their taxes and sharing sensitive information online, so they increase…
ChatGPT: Is its use of people’s data even legal?
In the world of AI and machine learning, the sudden massive popularity of language learning models is a hot topic. These tools — the current most popular of which is probably ChatGPT-3 — are language models that can answer specific…
W-2 phishing scams: Everything you need to know
It’s that time of year again – tax season – and, unfortunately, it’s also a peak time for phishing scams. Cybercriminals know that people are more likely to be filing their taxes and sharing sensitive information online, so they increase…
ChatGPT: Is its use of people’s data even legal?
In the world of AI and machine learning, the sudden massive popularity of language learning models is a hot topic. These tools — the current most popular of which is probably ChatGPT-3 — are language models that can answer specific…
AI in cybersecurity: The good, the bad, and the ugly
Artificial intelligence (AI) is rapidly becoming a powerful tool in the cybersecurity landscape, with the potential to revolutionize the way we detect and respond to cyber threats. However, as with any technology, there are also risks associated with the use…
Cryptocurrencies: How have they influenced cybercrime?
Cryptocurrencies have now been around for over a decade. Since their inception, they’ve been gaining traction as a legitimate form of currency. However, along with the rise in popularity of cryptocurrencies, there has also been a rise in the use…
Malicious USB devices: What are the risks?
It’s understandable that when people find a misplaced USB drive or memory stick, they want to find out what it contains. Human curiosity is what attackers exploit, after all. However, plugging an unauthenticated device into your own or work computer…
Cryptocurrencies: How have they influenced cybercrime?
Cryptocurrencies have now been around for over a decade. Since their inception, they’ve been gaining traction as a legitimate form of currency. However, along with the rise in popularity of cryptocurrencies, there has also been a rise in the use…
The dark web in 2023: What’s on it?
When it comes to the internet, most of us only scratch the surface. The vast majority of what we know and use on a daily basis is the “surface web,” which includes all the sites that can be easily accessed…
DDosia: A botnet created to facilitate DDoS attacks
The DDosia project is a successor of the Bobik botnet linked to the pro-Russian hacker group called NoName(057)16, as revealed in a recent analysis by Avast researcher Martin Chlumecky. The group targets DDoS attacks on private and public organizations in…
Antivirus exceptions: Think twice before making them
Have you ever allowed some “exceptions” to slip through the cracks, even after your security software warned you that it wasn’t safe to do so? Probably – it’s a safe bet that most people have. But while you might think…
Shopping scams: Scammers targeting secondhand shopping sites
Buying and selling secondhand items has become pretty popular, as there are some platforms that allow people to do it easily from home. One of these platforms is Vinted, which is a well known site in Europe and North America…
Smishing: The new year is here — and so are new scams
Smishing has become an increasingly popular attack method among cybercriminals – and they’re getting better at using it. This article has been indexed from blog.avast.com EN Read the original article: Smishing: The new year is here — and so are…
Oura Ring: The privacy-protecting fitness tracker
‘Tis the season, everyone! As the year wraps up, many of us are likely thinking about New Year’s resolutions. And what’s on the top of everyone’s list, basically every year? Fitness! Yeah, I know, I know; this is the year…
Online shopping: How to tell whether an item is legit
Shopping online can be a convenient and enjoyable experience. However, with so many fake and counterfeit products on the market, it’s crucial to know how to spot the real deal. Here are six tips on how to tell whether an…
Reading list: Infosec books for 2023
If you’re looking for recommendations for infosec books to give to a colleague – or even to catch up on some holiday reading of your own – here’s a suggestion: Take a closer look at the oeuvre of Bruce Schneier,…
Apple Watch: What does yours know about you?
Apple Watch was kind of a joke when it launched. Wearable tech didn’t have a great reputation at the time (remember the debacle that was Google Glass?), and Apple Watch was viewed by many as one more non-essential tech toy…
An update on international data privacy protection
The 38 member countries of the Organization for Economic Cooperation and Development (OECD) have recently adopted a new international agreement regulating government access to its citizens’ private data. The OECD draws on its membership from countries on several continents, including…
Ring doorbell: Here’s what it knows about you
New gadgets make excellent holiday gifts. They’re useful, oftentimes a little more expensive than most people are willing to pay on their own, and can be a lot of fun! But, unfortunately, many of this year’s hottest tech gadgets also…
Merry Patching Christmas
For those of you that are on your way to take a break next week, we’ve got a bit of advice to avoid encountering some unnecessary scares during this time that you’ll be spending with your loved ones. This article…
EWC and EUDI wallet: Helping individuals protect their online identity
The EU Digital Identity Wallet Consortium (EWC) has been selected by the European Commission to run one of the Large Scale Pilots for the new EU Digital Identity Wallet (EUDI) ecosystem. Avast sits on the Executive Team of the consortium,…
DoD supply chain lessons learned
A July 2022 survey of 300 U.S. Department of Defense (DoD) IT contractors shows a woeful lack of information security in the majority of situations. These contractors are part of the DoD’s supply chain that, in typical government speak, is…
This year’s hottest tech: Related privacy concerns
The holiday season is upon us, and many of us are looking forward to soon unwrapping the latest and greatest tech gadgets. From smartphones and smart speakers to fitness trackers and home security cameras, there are plenty of exciting new…
Phishing scams: The easy way to protect yourself
Phishing scams are on the rise, with millions of people falling victim to these online scams every year. In fact, according to the FBI’s Internet Crime Complaint Center, phishing scams accounted for more than half of all reported cybercrime incidents…
Online identity theft: Protecting yourself is easier than you think
John Smith* didn’t know he had a problem until he went to apply for a credit card. A new immigrant to the US from the UK, he wanted to start building his American credit as soon as possible. But when…
Android app signing keys leaked and used to sign malware
One of the most important pillars of Android security is the cryptographic signature key used by developers. Android app updates require that the sign key from the older app on your phone match the one you’re installing. Matching keys are…
2023: 3 major cybersecurity predictions for the new year
The end of the year is traditionally a time of reflection. In many industries — including cybersecurity and online privacy — it’s also a time of prediction around the year to come. This year, Avast has three major predictions for…
9 online scams to watch out for this holiday season
The holiday season is upon us, and that means it’s time to start shopping for gifts. But it’s not just the hustle and bustle of the holiday season that you need to be aware of; there are also online scams…
SMS delivery scams: Beware of threats this holiday season
With Black Friday behind us and Christmas now just around the corner, many of us are expecting a number of packages to arrive at our homes. We can typically track these using a website run by the delivery service, or…
International police operation takes down iSpoof
Last week, an international group of law enforcement agencies took down one of the biggest criminal operators of a spoofing–as-a-service enterprise. Called iSpoof, it collected more than $120M from victims across Europe, Australia, Ukraine, Canada, and the United States. During…
AVAR 2022 kicks off in Singapore
Here’s an exciting piece of news: This week, the Association of Anti-Virus Asia Researchers (AVAR) is celebrating their 25th annual security conference in Singapore. This article has been indexed from blog.avast.com EN Read the original article: AVAR 2022 kicks off…
Book review: How has social media rewired our minds?
With the reinstatement of previously banned Twitter luminaries including Donald Trump and Kathy Griffin, now’s the perfect time to do further research into the role of social media in our public discourse. This article has been indexed from blog.avast.com EN…
Speed up your computer with these 5 quick tips
When you turn on your computer in the morning, do you have enough time to brew a cup of coffee while it starts up? Is your PC so tired that you can take a walk around the block waiting for…
Looking for love in all the wrong (internet) places
We have seen scams trying to lure guys into relationships for many years. This was so common that back in 2007, for a few months I collected all those scam emails that I received. All of them were pretty obvious,…
Someone is spying on you
When we hear the word “spy,” we usually think of Cold War era, cloak-and-dagger spies. But in the digital age when we say someone is “spying” on you, we’re talking about online. And someone is almost certainly spying on you.…
How to be a savvy online shopper this holiday season
With the holiday shopping season starting earlier and earlier, you’ve probably already jumped into the world of holiday online shopping this year. But as your text messages, emails, and social media advertisements fill up with “killer deals,” we want to…
Using AI as an offensive cyber weapon
AI is a double-edged sword. It has enabled the creation of software tools that have helped to automate tasks such as prediction, information retrieval, and media synthesis, which have been used to improve various cyber defensive measures. However, AI has…
How to be a savvy online shopper this holiday season
With the holiday shopping season starting earlier and earlier, you’ve probably already jumped into the world of holiday online shopping this year. But as your text messages, emails, and social media advertisements fill up with “killer deals,” we want to…
Using AI as an offensive cyber weapon
AI is a double-edged sword. It has enabled the creation of software tools that have helped to automate tasks such as prediction, information retrieval, and media synthesis, which have been used to improve various cyber defensive measures. However, AI has…
Improve user security with UX design using these tips
Neglecting user security puts users at risk financially, professionally and even sometimes physically. When it comes to user experience, we can safely say that it has become very important to think about user security when designing digital products. This article…
New phishing campaign posing as Spain’s Tax Agency
There’s a brand new phishing campaign on the run in Spain that poses as the Spanish Tax Agency, Agencia Tributaria. This article has been indexed from blog.avast.com EN Read the original article: New phishing campaign posing as Spain’s Tax Agency
Twitter Blue means bad things for the platform’s security
Shortly after acquiring Twitter, Elon Musk announced that Twitter will be launching an $8 monthly subscription that gives users the ability of actually buying a verified Twitter account, otherwise known as Twitter Blue. Currently, this functionality is available in the…
World Cup 2022: Watch out for scams
In less than two weeks, the largest sporting event in the world will begin: The FIFA World Cup 2022. According to official data, the last time it took place (in Russia during 2018), the tournament was followed by nearly 3.6…
MFA recommendations from CISA
The US Cybersecurity and Infrastructure Security Agency (CISA) has recently published a fact sheet on implementing phishing-resistant multi-factor authentication (MFA). The publication is in response to a growing number of cyberattacks that leverage poor MFA methods. “Not all forms of…
How to stay safe when using public Wi-Fi hotspots
Many of the Wi-Fi hotspots you use in your hometown and when you travel have major security flaws that make it easy for hackers to see your browsing activity, searches, passwords, videos, emails, and other personal information. It’s a public…
Emergency plan: What to do if you’ve been hacked
Your family has a plan in case of a fire. You might have one for earthquakes, or other natural disasters. And, these days, it’s a good idea to also have a plan for what you’re going to do if you’ve…
Avast Threat Labs releases Q3 2022 Threat Report
Cyber threats are constant and the third quarter of 2022 was no exception. The Q3 Threat Report from Avast Threat Labs found an increase in PC adware activity, continued chaos caused by cyber criminal gangs, and an increase in ransomware…
The latest challenges to Section 230 reach the Supreme Court
The 2015 murder of the 23-year ago American student Nohemi Gonzalez is about to take center stage in a case that has made its way to the US Supreme Court. The woman was one of 129 people killed in Paris…
How to gain access to your loved one’s online accounts after they die
Nearly 60% of American adults have a social media account and, chances are, if you’re reading this, you’re one of them. What happens to those accounts when the person dies? And what about online banking and mortgages and bills and…
Scary cybersecurity stories to tell in the dark
Greetings, kiddies! It’s your old pal the Vault Keeper, sneaking into the Avast Security News Team’s office after hours to pull together a decadent dinner of dark delicacies for you. I ran my bony fingers through the archives and found…
Make Your Device Run Like New Again | Avast
Are you secretly tech-challenged? Don’t be ashamed to say so –– you’re not alone. A British study involving 2,000 device owners revealed that almost 50% admit they are not very knowledgeable when it comes to resolving tech issues. Additionally, 15%…
Blue checks on the black market
Scammers are stealing verified Twitter and Instagram accounts in order to resell them on the black market to other scammers who will use them to promote NFT frauds. According to investigative reporting by The Verge, sales of these stolen accounts…
Prioritizing Cybersecurity in Hybrid Environments | Avast
For many small and medium-sized businesses (SMBs), prioritizing cybersecurity in hybrid work environments is a challenge. In recent years, a large number of SMBs have shifted to a hybrid workplace structure, where employees work from home for a portion of…
Phishing: The tip of the iceberg
Day after day, we see news about new cyberattacks: Data breaches, yet another ransomware attack, and so on. From big companies to individuals, all of us are affected by these threats. A fact that isn’t that well known is that…
Make Your Device Run Like New Again | Avast
Are you secretly tech-challenged? Don’t be ashamed to say so –– you’re not alone. A British study involving 2,000 device owners revealed that almost 50% admit they are not very knowledgeable when it comes to resolving tech issues. Additionally, 15%…
Prioritizing Cybersecurity in Hybrid Environments | Avast
For many small and medium-sized businesses (SMBs), prioritizing cybersecurity in hybrid work environments is a challenge. In recent years, a large number of SMBs have shifted to a hybrid workplace structure, where employees work from home for a portion of…
Navigating online safety at any age
The sandwich generation — which is people in their 30s and 40s who are both raising their own children and caring for aging parents — has always had a lot on its plate. And, these days, there’s a relatively new…
Facebook Account After Death | Avast
Facebook is an important part of a human’s life events. We announce the most important milestones on our timelines by sharing with our Facebook friends the joy of getting married, having babies, or moving abroad. But what will happen with…
Prioritizing Cybersecurity in Hybrid Environments | Avast
For many small and medium-sized businesses (SMBs), prioritizing cybersecurity in hybrid work environments is a challenge. In recent years, a large number of SMBs have shifted to a hybrid workplace structure, where employees work from home for a portion of…
Navigating online safety at any age
The sandwich generation — which is people in their 30s and 40s who are both raising their own children and caring for aging parents — has always had a lot on its plate. And, these days, there’s a relatively new…
Facebook Account After Death | Avast
Facebook is an important part of a human’s life events. We announce the most important milestones on our timelines by sharing with our Facebook friends the joy of getting married, having babies, or moving abroad. But what will happen with…
Cyber Awareness Quiz | Avast
Take our cyber awareness quiz and learn how you can navigate discussions with your family around the complexities of technology and digital threats. Our goal is help you, the “sandwich generation,” keep both both aging parents and young children safe online. This…
Internet death etiquette: Consider these things before creating an RIP post
Despite the fact that death has been a part of the human experience for as long as there have been humans, we’re still not great at dealing with it. We create rules, rituals, and etiquette to help us get through,…
Cyber Awareness Quiz | Avast
Take our cyber awareness quiz and learn how you can navigate discussions with your family around the complexities of technology and digital threats. Our goal is help you, the “sandwich generation,” keep both both aging parents and young children safe online. This…
Internet death etiquette: Consider these things before creating an RIP post
Despite the fact that death has been a part of the human experience for as long as there have been humans, we’re still not great at dealing with it. We create rules, rituals, and etiquette to help us get through,…
Passwords for kids: How to create and manage them
Parenting in the 2020s means lots of passwords. You have school devices. You have soccer team logins. You have Roblox and Minecraft and YouTube. Sometimes it feels like your kids have more accounts than you do! Which means it’s very,…
Internet death etiquette: Consider these things before creating an RIP post
Despite the fact that death has been a part of the human experience for as long as there have been humans, we’re still not great at dealing with it. We create rules, rituals, and etiquette to help us get through,…
Passwords for kids: How to create and manage them
Parenting in the 2020s means lots of passwords. You have school devices. You have soccer team logins. You have Roblox and Minecraft and YouTube. Sometimes it feels like your kids have more accounts than you do! Which means it’s very,…
Caffeine makes phishing easy
A phishing-as-a-service (PhaaS) platform called Caffeine is unlike others in that it offers an open registration process, requiring neither invitations nor referrals, allowing anyone who registers to access all the tools one could need to launch a phishing attack. “Phishing…
Passwords for kids: How to create and manage them
Parenting in the 2020s means lots of passwords. You have school devices. You have soccer team logins. You have Roblox and Minecraft and YouTube. Sometimes it feels like your kids have more accounts than you do! Which means it’s very,…
Caffeine makes phishing easy
A phishing-as-a-service (PhaaS) platform called Caffeine is unlike others in that it offers an open registration process, requiring neither invitations nor referrals, allowing anyone who registers to access all the tools one could need to launch a phishing attack. “Phishing…
The IRS warns smishing attacks are on the rise
Smishing, or phishing carried out using SMS text messages, is once again on the rise, according to new reports from the IRS. They have warned Americans of the situation last month; this warning joins one issued by the FCC back…
Cryptojacking is back in the news – and it’s increasing
The use of cryptojacking attacks is once again in the news and in favor for online attacks. This form of attack uses malware to insert specialized and hidden “mining” apps to create new coins for the attackers. It has been…
The IRS warns smishing attacks are on the rise
Smishing, or phishing carried out using SMS text messages, is once again on the rise, according to new reports from the IRS. They have warned Americans of the situation last month; this warning joins one issued by the FCC back…
Browsing history: Many UK adults don’t know it’s visible to third parties
Avast recently conducted research that discovered misconceptions about privacy protection while browsing the web. 2 in 5 Brits (43%) don’t know their browsing history could be used to scam them financially, and 44% aren’t aware that it can be sold…
Browsing history: Many UK adults don’t know it’s visible to third parties
Avast recently conducted research that discovered misconceptions about privacy protection while browsing the web. 2 in 5 Brits (43%) don’t know their browsing history could be used to scam them financially, and 44% aren’t aware that it can be sold…
BeReal has some major privacy issues
There’s a new social media app in town and it’s making waves. BeReal — which launched in 2020 but didn’t really start gaining traction until midway through 2022 — encourages people to step away from the curation and filtering of…
10 blind spots in your SMB’s cyber defense
Many organizations struggle with developing the right strategy to keep their business protected and also achieve a defense that is cyber resilient. This article has been indexed from blog.avast.com EN Read the original article: 10 blind spots in your SMB’s…
Defending digital freedom in times of cyberwar
From Austin to Paris, and then from Paris to Toronto, I joined Ondrej Vlcek, back then Avast’s CEO and today President at NortonLifeLock, at my third conference (and country) in three weeks. Speaking with Ondrej at Collision has become a…
Robocalls: FCC cracks the whip
The Federal Communications Commission (FCC) has given regional US voice service providers Akabis, Cloud4, Global UC, Horizon Technology Group, Morse Communications, Sharon Telephone Company, and SW Arkansas Telecommunications and Technology 14 days to prove they have taken action to mitigate…
BeReal has some major privacy issues
There’s a new social media app in town and it’s making waves. BeReal — which launched in 2020 but didn’t really start gaining traction until midway through 2022 — encourages people to step away from the curation and filtering of…