Here are a few tips for geeks to save their holidays: simple explanations of 3 of the biggest infosec-related threats of the year 2014, to share with their friends & relatives.
If you were asked to name the country that you thought is the source of the majority of hacking attempts, which country would you name?
We have been wrong.
In 2012 when we started the iTES project (a project which deals with running vulnerable parts of a computer system in virtual machines; find out more in this blog post) our basic assumption was that until 2014 malware will no longer detect virtual machines because they would be too common …
Phishing or stealing of credit card and bank account information is no longer a threat exclusively for personal computers. Almost everybody has already received some phishing e-mails imitating official messages from the Bank. They usually ask users to enter their bank account or credit card information in order to make sure that the account is valid. There is also a lot of malware created to steal financial information from infected devices. Against all expectations, not only desktop systems are affected by these threats.
During the last couple of weeks we have received various requests on our standpoint and capabilities regarding the detection of spyware programs developed by governments. It looks like this has become the hot topic of the moment also due to the recently discovered Regin malware.
According to the latest “Windows Full Product Tests” for security software performed by AV-TEST in September and October 2014, Avira Antivirus gets the maximum score on performance (6/6), usability (6/6) and protection (6/6). What more can you wish for when you want to choose the right solution to secure your digital devices?
It’s been an extraordinary year for our antivirus and the best reward our hard working team could ever get was an impressive collection of great reviews from Industry leading experts and independent lab testers. Here’s a top 3 of the best news we’ve got from them in 2014.
Last Friday, mobile operator AT&T Mobility announced that it had stopped using hidden codes embedded in data that is transmitted from customers’ smartphones. Score a victory for privacy.
When advanced smartphones first started to hit the market, one of the integrated pieces of technology that people were most excited about was GPS. Now you were able to easily get directions, find interesting things around you, and check in to places where you were.
The problem: Having to analyse several hundred thousand potential malware samples every day. The solution: Building a scalable system that has detailed information about sample behavior and functionality with the help of Cuckoo Sandbox.