Blog | Avast ENПт., 20 апр. Текст источника в новой вкладке
Avast security experts write about cybersecurity threats and share solutions and tips you can use to stay secure in the digital world.

1. US & UK issue security warning and tech giants join forces | AvastПт., 20 апр.[−]

US & UK on alert for possible cyberattack

On Monday, the US Department of Homeland Security, the FBI, and the UK National Cyber Security Center issued a first-ever joint statement warning businesses and residents of both nations that a wide-scale cyberattack could be imminent.

2. Is Your Business Vulnerable to a Cyberattack? | Avast BusinessСр., 18 апр.[−]

It seems like every other day we hear another story about a massive data and security breach at a major corporation or public institution. If you own a small to medium-sized business (SMB), perhaps you think that these types of threats don’t concern you — that your company is too small for anyone to notice or bother with a cyberattack.

3. What to do when faced with large-scale cyberattacksСр., 18 апр.[−]

So you’ve heard there could be a big cyberattack coming…

Perhaps you’ve turned on the news and caught wind of warnings about, umh, some countries allegedly trying to mess with other countries’ cyber networks and infrastructure — even private homes. And now you’re worried. What does this mean? Will my devices stop working? Is my internet safe? What do I do?

4. Recent findings from CCleaner APT investigation reveal that attackers entered the Piriform network via TeamViewer | AvastСр., 18 апр.[−]

Today, I shared new findings from Avast’s continued investigations of the CCleaner APT (Advanced Persistent Threat) at RSA.

5. Minecraft players exposed to malicious code in modified “skins” | AvastВт., 17 апр.[−]

UPDATE: Minecraft has issued an update to resolve the skins issue."

Nearly 50,000 Minecraft accounts have been infected with malware designed to reformat hard-drives and delete backup data and system programs, according to Avast data from the last 30 days. The malicious Powershell script identified by researchers from Avast’s Threat Labs uses Minecraft “skins” created in PNG file format as the distribution vehice. Skins are a popular feature that modify the look of a Minecraft player’s Avatar. They can be uploaded to the Minecraft site from various online resources.

6. Take the cryptomining challenge at RSA | AvastПн., 16 апр.[−]

If you are in San Francisco this week, check out RSA at the Moscone Center and swing by the Avast booth to witness the effects of real-time cryptomining firsthand. We’ll be hosting a challenge that reveals the vulnerabilities in IoT and mobile devices through the mining of Monero using smartphones. We will also have a PC on display as an infected Amazon Fire TV stick forces it to cryptomine, so the effects (such as overheating) will be plain to see.

7. Get Rid of Toolbars, Adware, Trials and Bloatware | AvastСб., 14 апр.[−]

This guide helps you identify this secret ‘bloatware’ you don’t need.

PC makers often preload your desktop and laptop with toolbars, app trials, advertising software and other programs that you don’t want – all software commonly known as “bloatware.” The result? A super slow PC that runs out of disk space faster than you can fill it. In this blog post we’ll show you a few easy steps to help you get rid of such stuff.

8. Facebook goes to Washington and Verizon announces #1 threat | AvastПт., 13 апр.[−]

This month’s “Patch Tuesday” is turbo-charged

Microsoft releases system updates on the second Tuesday of each month, and this month’s “Patch Tuesday” is a whopper. It covers nearly 70 security issues, 20 of which are rated “critical.”

9. Should you use an ad blocker? | AvastПт., 13 апр.[−]

Ad blockers exist for every platform—desktops, laptops, tablets, and smartphones. But is it worth it to install this software? On the surface, it seems like a no-brainer. We fast-forward through the commercials on television, throw out the junk mail we find in our mailboxes, delete the spam that infests our email inboxes, so why wouldn’t we want to eliminate those obnoxious and distracting ads that ruin our browsing experience?

10. Best practices to protect data, devices, and people | Avast BusinessЧт., 12 апр.[−]

We’ve discussed why SMBs are such attractive targets to cybercriminals, and what the key vulnerabilities are, but let’s talk now about how to protect these attack surfaces. Once an MSP identifies all the physical and virtual computing devices in their SMB client’s organization, the next step is to secure all the data, as well as the devices, and to put measures in place to protect the SMB’s people.

Каталог RSS-каналов (лент) — RSSfeedReader
Всего заголовков: 10
По категориям:
Все заголовки
#antivirus (1)
Avast News (2)
#browser (1)
Business Security (2)
#cryptomining (2)
#cybercrime (1)
#events (1)
#facebook (1)
#gaming (1)
#malware (1)
#passwords (1)
#performance (1)
#privacy (1)
#ransomware (1)
Security News (2)
Threat Research (2)
Tips & Advice (3)
По датам:
Все заголовки
2018-04-20, Пт. (1)
2018-04-18, Ср. (3)
2018-04-17, Вт. (1)
2018-04-16, Пн. (1)
2018-04-14, Сб. (1)
2018-04-13, Пт. (2)
2018-04-12, Чт. (1)
По авторам:
Все заголовки
Avast Security News Team (2) (Alexej Sav?in) (1) (Arne Uppheim) (1) (Gonzalo Torres) (1) (Mark Whiffen) (1) (Martin Stellar) (1) (Ondrej Vlcek) (1) (Scott Curtiss) (1)
Nancy Nunziati (1)