Mobile threats are everywhere – here’s what you can do

Even if your company issues you a locked-down smartphone, embracing best security practices remains vital Our smartphones. Where would we be without them? If you’re anything like me, making a phone call is the fifth or sixth reason to reach […]

Read more

AVAST: 5 steps to keep your SMB data protected

When Edward Snowden came forward in May 2013, accusing the world’s largest intelligence service of spying on US allies, people, and private companies, it became evident that electronic data is quite vulnerable. This major event even caused Russian and German […]

Read more

AVAST Blog: What is the Bash bug, and how do I prevent my systems from being Shellshocked?

Working in the same way as SQL injection, Shellshock allows users to insert Bash (a Unix-based command processor, or shell) commands into a server via a web form or similar method, and exploits the very nature of environment variable handling, […]

Read more

AVAST Makes the Most Trusted Antivirus in the World Even Faster and More Effective

AVAST Makes the Most Trusted Antivirus in the World Even Faster and More Effective   ~ Smaller, more frequent updates allow the only antivirus with boot-time scanning to spot and stop malware faster ~ REDWOOD CITY, California, October 15, 2013 […]

Read more