The annual Pwn2Own hacking competition wrapped up its 2015 event in Vancouver with another 21 critical bugs in Firefox, Chrome, Safari, IE, Adobe Flash, Adobe reader, and last, but definitely not least, the Windows operating system. For those who don’t know the contest, the name “Pwn2Own” is derived from the fact that contestants must “pwn” or hack the device in order to “own” or win it.
Once upon a time, when online advertisement was not even allowed, you would at least have been mildly laughed at when saying it was going to be a nine figure business.¹ Nowadays the use of web ads and ad blockers has become second nature. Besides visual relaxation, there are other good reasons to keep advertisements off your computer.
In Part 1 of this series, we explained how Avira’s virus hunters find out about malicious websites and collect examples of virus code using honeypots and other methods. In this segment, we’re going to look at how the Avira Protection uses Big Data to develop counter-measures that keep you and your devices safe.
We believe that empowered, self-motivated people can accomplish huge things.
Internet security software is a first and important step to protect yourself from online threats. An up-to-date virus scanner, enabled FireWall and the latest patches and updates ensure that a majority of the threats are ineffective. But software alone cannot provide 100 percent protection.