10 things you might not know about Avira Romania

It’s been already 10 years since the Avira office was opened in Romania. Even though we did not talk very often about it, those 10 years have had an interesting trajectory we want to share.

avira-ro-colaj
I was recently reading an article about the start-up environment in Bucharest and even though at first my thoughts obviously…
Read More

Useful vacation apps, our staff picks

Whether you are staying at a hotel, going camping, or taking a long trip – here is a list of some practical apps for your next vacation.

holiday-apps
Vacation! For some it is a welcome opportunity to leave all that technical stuff behind. But it doesn't have to…
Read More

The rise of idea viruses

We live in a time where information can spread around the world in the blink of an eye. Social media is responsible for this to a large extent, and we’ve seen this demonstrated time and time again. For better or worse, a simple post can turn someone into a known name, even offline.

idea-virus
While the impact that regular people can have on social media gets a lot of attention these days, there’s still…
Read More

CyberVor hacked 1.2 billion passwords

News began circulating yesterday about a group of Russian hackers who appear to have stolen 1.2 billion unique username/password pairs by hacking and harvesting more than 420,000 ordinary websites and FTP sites over the past seven months.

password-theft
The CyberVor hack was the largest ever breach of personal identity information so far —larger than the Adobe breach, larger…
Read More

How does iOS Mobile Security work and why do I need it?

A number of our customers have reached out to our teams to ask if they need extra security for an iOS device. The general question we hear seems to be that since Apple does such a good job at stopping malware coming into the iOS ecosystem, is there a need for extra iOS mobile security?

ios-mobile-security
Well let’s go back to basics. Apple’s iOS framework is built around the idea of “sandboxing”. Each application (app) literally…
Read More

How Virus Hunters catch the Bad Guys (Part 3)

In Part 1 and Part 2, we explained how Avira finds out about new malware and malicious websites using honeypots, and how Avira uses big data and statistical analyses to engineer counter-measures. In this final segment, we’re going to tell you how Avira stops malware on your computer or mobile device before it gets infected.

avira-protection
You know now about how Avira finds out about new malware types and how we engineer the antidote. But how…
Read More

How Virus Hunters catch the Bad Guys (Part 2)

In Part 1 of this series, we explained how Avira’s virus hunters find out about malicious websites and collect examples of virus code using honeypots and other methods. In this segment, we’re going to look at how the Avira Protection uses Big Data to develop counter-measures that keep you and your devices safe.

malware-analysis
The volume of viruses, Trojans and other malware running loose on the Internet has mushroomed in recent years. In one…
Read More

Trouble with Trojans

A Trojan is a type of malware that pretends to be legitimate software but contains a payload such as ransomware, password stealers, a backdoor installer, etc. Like the legendary story about the Trojan Horse used to trick the enemy into allowing Greek soldiers to enter the city of Troy, Trojan malware gets onto your computer by tricking you to install it willingly.

trojan-file
Common examples include trojanized mobile apps (usually spoofed versions of popular apps like Angry Birds and Bad Piggies) and even…
Read More
1 2 3 4