Rosetta is a new way to create Flash files, which enabled a new kind of vulnerability, on many popular websites.
It’s been already 10 years since the Avira office was opened in Romania. Even though we did not talk very often about it, those 10 years have had an interesting trajectory we want to share.
Whether you are staying at a hotel, going camping, or taking a long trip – here is a list of some practical apps for your next vacation.
We live in a time where information can spread around the world in the blink of an eye. Social media is responsible for this to a large extent, and we’ve seen this demonstrated time and time again. For better or worse, a simple post can turn someone into a known name, even offline.
News began circulating yesterday about a group of Russian hackers who appear to have stolen 1.2 billion unique username/password pairs by hacking and harvesting more than 420,000 ordinary websites and FTP sites over the past seven months.
For the fifth time in a row Avira Free Antivirus for Android has earned the highest possible rating in a bi-monthly test series conducted by reputed and independent AV-TEST security institute.
A number of our customers have reached out to our teams to ask if they need extra security for an iOS device. The general question we hear seems to be that since Apple does such a good job at stopping malware coming into the iOS ecosystem, is there a need for extra iOS mobile security?
In Part 1 and Part 2, we explained how Avira finds out about new malware and malicious websites using honeypots, and how Avira uses big data and statistical analyses to engineer counter-measures. In this final segment, we’re going to tell you how Avira stops malware on your computer or mobile device before it gets infected.
In Part 1 of this series, we explained how Avira’s virus hunters find out about malicious websites and collect examples of virus code using honeypots and other methods. In this segment, we’re going to look at how the Avira Protection uses Big Data to develop counter-measures that keep you and your devices safe.
A Trojan is a type of malware that pretends to be legitimate software but contains a payload such as ransomware, password stealers, a backdoor installer, etc. Like the legendary story about the Trojan Horse used to trick the enemy into allowing Greek soldiers to enter the city of Troy, Trojan malware gets onto your computer by tricking you to install it willingly.