Pwn2Own: Nothing is safe

The annual Pwn2Own hacking competition wrapped up its 2015 event in Vancouver with another 21 critical bugs in Firefox, Chrome, Safari, IE, Adobe Flash, Adobe reader, and last, but definitely not least, the Windows operating system. For those who don’t know the contest, the name “Pwn2Own” is derived from the fact that contestants must “pwn” or hack the device in order to “own” or win it.

Pwn2Own: Nothing is safe
Chrome got both its stable and beta versions hacked in just two minutes. Google paid $75,000 for just one buffer…
Read More

Why blocking advertisements matters

Once upon a time, when online advertisement was not even allowed, you would at least have been mildly laughed at when saying it was going to be a nine figure business.¹ Nowadays the use of web ads and ad blockers has become second nature. Besides visual relaxation, there are other good reasons to keep advertisements off your computer.

online-ads
(more…)
Read More

How Virus Hunters catch the Bad Guys (Part 2)

In Part 1 of this series, we explained how Avira’s virus hunters find out about malicious websites and collect examples of virus code using honeypots and other methods. In this segment, we’re going to look at how the Avira Protection uses Big Data to develop counter-measures that keep you and your devices safe.

malware-analysis
The volume of viruses, Trojans and other malware running loose on the Internet has mushroomed in recent years. In one…
Read More

Avira’s top-12 check list for greater internet security

Internet security software is a first and important step to protect yourself from online threats. An up-to-date virus scanner, enabled FireWall and the latest patches and updates ensure that a majority of the threats are ineffective. But software alone cannot provide 100 percent protection.

online-security
Your active participation in is necessary. But do not worry, you only need to observe a few basic internet security…
Read More