General

Upgrade of older consumer products to Version 2013

The malware landscape is evolving on a very rapid pace and these days, the technologies released 2 or 3 years ago are becoming slowly obsolete. That’s why providing security only through engine and signature updates is no longer considered enough. In order to ensure that our customers are using the best protection available, we released […]

General

Ubisoft breached, users asked to reset passwords

If you’re a Ubisoft customer, you probably wondered why you are  being asked to reset your password. Ubisoft is now part of the “big family” of prominent websites that got hacked and lost customer data: LinkedIn, eHarmony, LastFM and others. In a post called “SECURITY UPDATE REGARDING YOUR UBISOFT ACCOUNT – PLEASE CREATE A NEW […]

General

Improve your security #16: Encrypt your data

The best way to protect your data is to use encryption. Encryption is is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can. [check Wikipedia for more details]. Applied to files, this means that each file is encrypted in such a way that […]

General

We’ve heard you: Goodbye “Expert mode” !

Some years ago, it was common practice to hide options that are most likely not going to be used by everyone. This is how the few advanced options were kept away from the what we call “average user” and made available only to tech-savvy users. On the product’s side, the further development of the technology […]

General

Facebook likejacking scam via Twitter

The tweet your receive is ”we are looking for twitter members to try our brand new product at twitgiveaway,com”, mostly as a reply to one of your tweets. There is no mistake in the URL: “twitgiveaway,com”. There is indeed a comma there instead of a dot. The reason for this is that the fraudsters are trying […]

General

OWASP Top 10 Project 2013 published

The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. The goal of the Top 10 project is to raise awareness about application security by identifying some of the most critical risks facing organizations. As a leading security software vendor, Avira […]

General

How to combat the brute force attacks on WordPress blogs

We wrote 1.5 months ago in the article Botnet attack on WordPress about the ongoing distributed attack on the WordPress platform. WordPress has a default administrator called “admin” which can be changed to any user upon installation. According to various sources, the attack guesses up to 1000 most commonly-used passwords (see here examples). Now, we see that […]

General

How to enable two-factor authentication for LinkedIn

More and more social media websites and not only are enabling two-factor authentication in order to secure their users better. Following Google, Facebook, Dropbox, Twitter, Microsoft now also the biggest professional network website LinkedIn has introduced two-factor authentication. Here is how to enable it in a few steps. 1. Go to your account and choose […]