Since the start of Android mobile applications growth in 2004, the number of applications which have a build-in advertisement functionality has been increasing dramatically, most of them targeting the user via mobile shop platforms.
Remember the little contest we started some time ago concerning our new browser name? While we are not ready to announce the winners yet (we take the search for the right browser name very serious. Finding and going through the different candidates takes a lot of time, as does the involved research), I’m sure you are more than happy to get a sneak peak, right?
Oh no, it’s Apple with a horrible security flaw yet again! Ok. It’s not THAT horrible. But it is a vulnerability that could lead to stolen iCloud passwords, if the user is not extra careful.
With the latest version of Apple Safari it’s possible to show users a completely different URL than the one that’s actually being accessed.
Not even a week after a critical cross-site scripting (XSS) flaw affected version 4.1.2 and an unknown numbers of plugins, the maintainers of Wordpress have rushed out the version 4.2.1 which fixes a zero-day vulnerability.
The annual Pwn2Own hacking competition wrapped up its 2015 event in Vancouver with another 21 critical bugs in Firefox, Chrome, Safari, IE, Adobe Flash, Adobe reader, and last, but definitely not least, the Windows operating system. For those who don’t know the contest, the name “Pwn2Own” is derived from the fact that contestants must “pwn” or hack the device in order to “own” or win it.
Once upon a time, when online advertisement was not even allowed, you would at least have been mildly laughed at when saying it was going to be a nine figure business.¹ Nowadays the use of web ads and ad blockers has become second nature. Besides visual relaxation, there are other good reasons to keep advertisements off your computer.
In Part 1 of this series, we explained how Avira’s virus hunters find out about malicious websites and collect examples of virus code using honeypots and other methods. In this segment, we’re going to look at how the Avira Protection uses Big Data to develop counter-measures that keep you and your devices safe.
We believe that empowered, self-motivated people can accomplish huge things.
Internet security software is a first and important step to protect yourself from online threats. An up-to-date virus scanner, enabled FireWall and the latest patches and updates ensure that a majority of the threats are ineffective. But software alone cannot provide 100 percent protection.