The Struggle For the Right Browser Name

Remember the little contest we started some time ago concerning our new browser name? While we are not ready to announce the winners yet (we take the search for the right browser name very serious. Finding and going through the different candidates takes a lot of time, as does the involved research), I’m sure you are more than happy to get a sneak peak, right?

name-stickers
First off let me tell you guys: you are awesome. We received a lot of mails with ideas for a…
Read More

Flaw in Mail.app Can Be Used to Hijack iCloud Password

Oh no, it’s Apple with a horrible security flaw yet again! Ok. It’s not THAT horrible. But it is a vulnerability that could lead to stolen iCloud passwords, if the user is not extra careful.

icloud
The flaw lies in the Mail.app, Apples default e-mail program for iOS. According to security researcher Jan Sourcek “this bug…
Read More

WordPress 4.2.1 Patches Zero-Day exploit

Not even a week after a critical cross-site scripting (XSS) flaw affected version 4.1.2 and an unknown numbers of plugins, the maintainers of Wordpress have rushed out the version 4.2.1 which fixes a zero-day vulnerability.

wordpress logo
This vulnerability is affecting all previous versions and can be leveraged via the comment section of a website running WordPress,…
Read More

Pwn2Own: Nothing is safe

The annual Pwn2Own hacking competition wrapped up its 2015 event in Vancouver with another 21 critical bugs in Firefox, Chrome, Safari, IE, Adobe Flash, Adobe reader, and last, but definitely not least, the Windows operating system. For those who don’t know the contest, the name “Pwn2Own” is derived from the fact that contestants must “pwn” or hack the device in order to “own” or win it.

Pwn2Own: Nothing is safe
Chrome got both its stable and beta versions hacked in just two minutes. Google paid $75,000 for just one buffer…
Read More

Why blocking advertisements matters

Once upon a time, when online advertisement was not even allowed, you would at least have been mildly laughed at when saying it was going to be a nine figure business.¹ Nowadays the use of web ads and ad blockers has become second nature. Besides visual relaxation, there are other good reasons to keep advertisements off your computer.

online-ads
(more…)
Read More

How Virus Hunters catch the Bad Guys (Part 2)

In Part 1 of this series, we explained how Avira’s virus hunters find out about malicious websites and collect examples of virus code using honeypots and other methods. In this segment, we’re going to look at how the Avira Protection uses Big Data to develop counter-measures that keep you and your devices safe.

malware-analysis
The volume of viruses, Trojans and other malware running loose on the Internet has mushroomed in recent years. In one…
Read More

Avira’s top-12 check list for greater internet security

Internet security software is a first and important step to protect yourself from online threats. An up-to-date virus scanner, enabled FireWall and the latest patches and updates ensure that a majority of the threats are ineffective. But software alone cannot provide 100 percent protection.

online-security
Your active participation in is necessary. But do not worry, you only need to observe a few basic internet security…
Read More