Being for 29 Years in the Antivirus business can make you wonder what made the company stand out from the crowd and become one of the Industry’s leaders. It’s exactly what we asked ourselves so we went looking for answers to the right people: the Avira employees.
Reports or articles about PUA (Potentially Unwanted Applications) are becoming more frequent every day. Some of these also define this type of software as PUP (Potentially Unwanted Program) or PUS (Potentially Unwanted Software). However, they all mean the same thing: A user downloads a program from the Internet and installs it on their PC. Yet, after installation, the user notices that not only has the program they wanted been installed, but heaps of other programs too.
Do you know what happens if someone else suddenly “owns” your DNS records and how you can secure your domains in order to prevent it? Go ahead and read the final part of our blog series to find out.
One of the biggest IT events in Europe took place in Hannover last week (16-20 March 2015). Avira couldn’t miss this edition of CeBIT, our team being present at the event for the whole week.
In our first part of “Secure your DNS to avoid losing business“, we explained what DNS is and where you’ll need and encouter it. Check it out and take a look at it if you haven’t done so already. Now, in part 2, we will talk about what happens when DNS doesn’t work and the different causes of a disruption.
Avira Antivirus Software blocks the installation of Potentially Unwanted Applications and releases new set of guidelines for all software vendors to respect.
The annual Pwn2Own hacking competition wrapped up its 2015 event in Vancouver with another 21 critical bugs in Firefox, Chrome, Safari, IE, Adobe Flash, Adobe reader, and last, but definitely not least, the Windows operating system. For those who don’t know the contest, the name “Pwn2Own” is derived from the fact that contestants must “pwn” or hack the device in order to “own” or win it.
Most likely you’ve already have heard of the Domain Name System (DNS) before. It is the equivalent of a phonebook for the internet and translates human readable names like www.google.com into IP addresses and vice-versa. This is the common knowledge which most people have over DNS. But there is so much more to it!
Read our three part blog series to find out 1) what DNS is and where it is used, 2) what happens when DNS doesn’t work, and of course 3) what you can do to secure your domain to avoid losing business.
No, it doesn’t have a name like Heartbleed or POODLE, it was “just” a denial-of-service. “Just” is by no means something to be ignored, but it is less dangerous with the previous vulnerabilities.
What is a digital certificate? You could describe it as a fingerprint for software to show its derivation. They are a way of defining ownership of a certain file.