AVG Threat Encyclopedia: Phishing
Introduction to Threat Encyclopedia The Threat Encyclopedia is where we arm you with knowledge to help you understand and avoid malware. This isn’t an in-depth analysis of malware code but instead...
View ArticleAVG CodeWord: False Positives
Any user with a casual passing interest in IT security will at some stage encounter the paradoxically named expression ‘false positive’. Not quite the tautological twist that it might at first sound...
View ArticleMultiMi emerges from one year beta
AVG is pleased to announce that today it is ending of the period of beta testing and making available on a widespread basis its social media aggregator MultiMi™. If you don’t know about MultiMi, then...
View ArticleAVG Threat Encyclopedia: Hacker Hats?
Introduction to Threat Encyclopedia The Threat Encyclopedia is where we arm you with knowledge to help you understand and avoid malware. This isn’t an in-depth analysis of malware code but instead...
View ArticleAVG Quarterly Threat Report: Q2 2012
What is the threat report? Every quarter AVG’s Threat Labs publish their findings after monitoring the threat landscape for three months. These findings are put together in the Community Powered...
View ArticleThe owls are not what they seem
Sometimes malware really doesn’t want to be analyzed by researchers and analysts, and refuses to run in a testing environment or when being debugged. Today, we will look into one sample which does...
View ArticleAVG Threat Watch: Week 31
UBISOFT Patch Uplay vulnerability Games developer Ubisoft announced a security patch this week for their Uplay software after admitting that a technical vulnerability has been discovered with the...
View ArticleAn Int 13 trick from the new Wapomi sample
It’s quite common for bootkit malware to modify the Master Boot Record (MBR), Volume Boot Record (VBR) and even BIOS but we were unaware of anything more innovative. Last week however, we found a new...
View ArticleOver one million AVG users protected from day-long wave of Blackhole-infected...
When Good Ads Go Bad Earlier this week numerous groups at AVG began noticing a massive wave of detections of Blackhole Exploit Kit being reported by many of our users. By midnight of that day, 1.6...
View ArticleMicrosoft Windows Registry loaded with malware
Nowadays it’s very common for threats to use rootkit techniques to hide malicious files on computer hard drive, but it’s not so common to hide actual payload in the Windows Registry and use malicious...
View ArticleDon’t worry if your system is infected – just wait for 70 years
It is quite usual to have a license expiration date built into commercial software, but what about malware? Is it common for malware to stop working and heal itself after some time? Well, it’s...
View ArticleOlder Microsoft Internet Explorer Versions Are Still at Risk
Microsoft Security Update MS12-063: Microsoft’s approach to user responsibility sees the company periodically releasing security updates to address newly identified vulnerability issues affecting...
View ArticleSilver surfers lack basic online security skills
Senior fun with tablet PC Adults aged between 46 and 64 years old are lacking knowledge and skills when it comes to online safety and therefore failing to protect against identity fraud. This group of...
View ArticleTwo year old PDF exploit returns to top AVG’s stats
For the last two weeks we have noticed a significant increase of PDF exploit attacks spreading as email attachments posing as fake invoice papers. However, exploring the PDF file has shown that the...
View ArticleFBI ransomware and what you can view from the street
When we saw the adjacent sign at a small-town, independent IT service company called The Computer Shop, in Carlisle, Pa (north eastern USA for those who need a geographical help!) we couldn’t resist...
View ArticleNew rogue security products to watch out for
Fake AV operators continue to change the graphic interface design on their malicious creations. Clones we’ve seen recently include “XP Antispyware Pro 2013,” “XP Defender 2013,” “XP Security 2013” and...
View ArticleCheck your Digital Baggage is not harming your career
Entering the world of work after University or college can often be a culture shock. It means having to be somewhere at a certain time, where previously you had far more flexibility. Depending on the...
View ArticleMobile banking attacks on Android platforms are here
The growing popularity of mobile banking and the Android platform for smartphones is combining to make this a fertile area for cyber criminals to target. AVG’s latest Threat Report confirms this trend...
View ArticleAVG Threat Update: Week 46
1. Scammers quickly exploit Hurricane Sandy disaster Email scammers quickly jumped to take advantage of the effort to aid communities in the northeastern U.S. hit by super storm Sandy last week....
View ArticleIs your virtual environment safe?
Virtual environments are popular products in the security industry, especially amongst us virus researchers. Virtualization software allows you to execute programs (including malware) in a virtual...
View Article
More Pages to Explore .....