home.social

#avast — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #avast, aggregated by home.social.

  1. Avast is preparing to transfer at least some of their GitHub repositories from the "avast" organization to the "gendigitalinc" organization.

    github.com/avast/ioc/pull/73

    I don't remember if GitHub automatically redirects links, so just wanted to put out an FYI in case people have stuff pointing to the old repositories.

    #Avast #GenDigital

  2. Avast: [Pops up out of the blue every few days] "You're being tracked! Buy our subscription to stay protected"

    YeahNah f*ck off avast with your fake (marketing) alerts. There really should be a law against this kind of fake "security issue, quick buy this!" scam, avast have become no better than other scammers..

    #Avast #Scam #Security #Software

  3. 📢🪝Watch out as scammers are cloning Avast’s website to push fake €499 charges and steal credit card details using urgency tricks, live chat, and realistic payment checks.

    #CyberSecurity #Phishing #Scam #Avast #Malware

    Read: hackread.com/fake-avast-websit

  4. Hay para todos. En cisa.gov/news-events/bulletins #Cisa publican semanalmente un listado de #vulnerabilidades #CVE 📉 . #Avast #GitLab #IBMInformix #NVIDIA #LIBPNG #RedHat #Samsung #SynologyDSM #Vim , plugins de #WP. Estos son los que más me suenan entre los de #HighVulnerabilites . Recordad las actualizaciones son ✋ importantes.

  5. Hay para todos. En cisa.gov/news-events/bulletins #Cisa publican semanalmente un listado de #vulnerabilidades #CVE 📉 . #Avast #GitLab #IBMInformix #NVIDIA #LIBPNG #RedHat #Samsung #SynologyDSM #Vim , plugins de #WP. Estos son los que más me suenan entre los de #HighVulnerabilites . Recordad las actualizaciones son ✋ importantes.

  6. Ranking antywirusów na koniec 2025 roku. Kto daje 100% ochrony, a kto zawodzi?

    Laboratorium AV-Comparatives opublikowało wyniki swoich najnowszych, kompleksowych testów oprogramowania zabezpieczającego.

    Raporty zamykające rok 2025 przynoszą dobre wieści dla użytkowników darmowych rozwiązań (świetny wynik Microsoft Defender), ale też ostrzeżenie przed produktami, które generują rekordowe liczby fałszywych alarmów.

    Najważniejszym sprawdzianem dla każdego pakietu ochronnego jest tzw. Real-World Protection Test. W edycji obejmującej okres od lipca do października 2025 roku badacze sprawdzili 19 popularnych programów na próbce 428 realnych zagrożeń (złośliwe strony, ataki drive-by download).

    Elita ze skutecznością 100%

    Bezbłędną skutecznością wykazały się trzy pakiety, które zablokowały absolutnie wszystkie próbki złośliwego oprogramowania (100% Protection Rate). Są to:

    • Avast (Free Antivirus)
    • AVG (AntiVirus Free)
    • Norton (Antivirus Plus)

    Tuż za nimi, z wynikiem 99,5%, uplasowała się silna grupa pościgowa, w której znalazły się m.in.: Kaspersky, ESET oraz Bitdefender (99,1%). Co istotne dla użytkowników systemu Windows – domyślny Microsoft Defender (standardowe oprogramowanie ochronne w systemie Microsoftu) również trafił do najwyższej kategorii „Advanced+”, osiągając solidne 99,1% skuteczności przy bardzo niskiej liczbie fałszywych alarmów.

    Trend Micro i Malwarebytes z problemami

    Wysoka wykrywalność to nie wszystko – liczy się też brak pomyłek. W tej kategorii najgorzej wypadł Trend Micro, który aż 75 razy błędnie oznaczył bezpieczne pliki lub strony jako zagrożenie. Słabo pod tym względem zaprezentowały się również Malwarebytes (42 fałszywe alarmy) oraz K7 (34 pomyłki). Z powodu tak dużej liczby błędów, produkty te zostały zdegradowane w rankingu końcowym do niższych kategorii certyfikacji, mimo przyzwoitej skuteczności wykrywania wirusów.

    Ochrona zakupów: wykrywanie fałszywych sklepów

    W kontekście zbliżających się Świąt, kluczowy jest test Fake Shops Detection 2025. Eksperci sprawdzali, czy antywirusy potrafią uchronić użytkownika przed wejściem na stronę udającą sklep internetowy, której celem jest kradzież danych karty kredytowej. Certyfikat potwierdzający skuteczność w tym obszarze otrzymała wąska grupa produktów:

    • Avast Premium Security
    • F-Secure Internet Security
    • Kaspersky Premium
    • Norton 360 Deluxe

    Zaawansowane zagrożenia i Stalkerware

    Dla najbardziej wymagających użytkowników przeprowadzono test Advanced Threat Protection (ATP), sprawdzający odporność na ataki celowane i bezplikowe. Tutaj rynek konsumencki prezentuje bardzo wysoki poziom – aż 7 z 8 testowanych produktów (w tym wersje darmowe Avast, AVG i Avira) otrzymało najwyższą ocenę „Advanced+”.

    Równolegle, we współpracy z Electronic Frontier Foundation (EFF), przetestowano 13 aplikacji mobilnych na Androida pod kątem wykrywania oprogramowania szpiegującego (stalkerware). Raport zwraca uwagę na niepokojący trend rynkowy: sprawcy przemocy domowej coraz częściej porzucają aplikacje szpiegowskie na rzecz tanich lokalizatorów Bluetooth (jak AirTag i podobne), co stanowi nowe wyzwanie dla branży bezpieczeństwa.

    Tylko 2% polskich małych firm jest gotowych na atak hakerów. Alarmujący raport Cisco

    #avComparatives #avast #falszyweSklepyInternetowe #microsoftDefender #news #norton #rankingAntywirusow2025 #stalkerware #testyBezpieczenstwa

  7. Avast Premium Business Security Review: Full Remote Security Management for Company Computers

    Avast Premium Business Security prioritizes the essentials to focus on what businesses need, enabling you to monitor and manage every company computer remotely and install protection as needed.

    pcmag.com/reviews/avast-premiu

    #avast #smallbusiness #pcmag #securitysuite

  8. "Enjoy the quiet..." while we plaster the FOURTH of these obnoxious notifications all across your screen!! 🙄

  9. All the sudden System Informer got removed by Avast doing a false positive as a PUP. Tried to reinstall but Avast stopped it saying the INSTALLER itself is IDP.Generic. What, the hell.

    CC: @mrmasterkeyboard
    Hashtags: #tech #technology #avast

  10. #Avast says:

    "We prevented your connection to watermeloncrimes.com because it is a
    dangerous webpage. Threat category: URL:Blacklist"

    What do you say?

    #Gaza
    #WaterMelonCrimes
    #security

  11. Somehow the fuckers at #Avast tricked my elderly uncle years ago into subscribing to an auto-renewing $100/yr VPN service he does not need and does not use.
    I found out only because I monitor his email and the renewal failed because his credit card expired.
    1/2
    #scam #DarkPatterns

  12. Eine Frage an meine EDV-Bubble (ja, PC, Microsoft, AscheaufmeinHaupt)
    Gibt es ein Computerschutzprogramm (Virenalarm, Festplattenscan, Aufräumen, nass durchwischen…), das ich einmal kaufe und dann ist gut?
    Mich nervt, dass ich bei meinen immer tausende „Leistungsprobleme“ und Gefahren angezeigt bekomme - und gebeten werde, das Programm upzugraden.
    Das ist mir unsympathisch - auch wenn es vielleicht notwendig wäre. Versteht ihr mein persönliches Problem mit Kundenfang?
    #edv #PC #Avast #Avira #rt

  13. It has been a while since I’ve written about Avast, so today I give you “How insecure is Avast Secure Browser?”

    palant.info/2024/07/15/how-ins

    Note: This isn’t a vulnerability disclosure, merely an overview of problematic design decisions.

    TL;DR from the article: I wouldn’t run Avast Secure Browser on any real operating system, only inside a virtual machine containing no data whatsoever.

    Some highlights:

    • Eleven pre-installed browser extensions but only two visible to users.
    • Two extensions unnecessarily relax Content-Security-Policy protection.
    • One of these two extensions also requesting all privileges possible, despite not actually using them.
    • Two extensions accept messages from any other extension and any Avast website, the latter without enforcing HTTPS connections.
    • One of these extensions, Privacy Guard (sic!), will expose information about your browser’s tabs via that messaging interface and provide updates as you browse the web.
    • The “onboarding” experience is designed as an extremely flexible way to nag you into using products that benefit Avast financially.
    • To make this “onboarding” work, the browser exposes internal APIs to a number of Avast domains that a huge number of third parties can put content on. Not only can each of these third parties abuse this access, a single XSS vulnerability will extend the access to any website on the internet (no effective CSP protection).

    Enjoy!

    #avast #avg #avira #ccleaner #securebrowser #infosec

  14. It has been a while since I’ve written about Avast, so today I give you “How insecure is Avast Secure Browser?”

    palant.info/2024/07/15/how-ins

    Note: This isn’t a vulnerability disclosure, merely an overview of problematic design decisions.

    TL;DR from the article: I wouldn’t run Avast Secure Browser on any real operating system, only inside a virtual machine containing no data whatsoever.

    Some highlights:

    • Eleven pre-installed browser extensions but only two visible to users.
    • Two extensions unnecessarily relax Content-Security-Policy protection.
    • One of these two extensions also requesting all privileges possible, despite not actually using them.
    • Two extensions accept messages from any other extension and any Avast website, the latter without enforcing HTTPS connections.
    • One of these extensions, Privacy Guard (sic!), will expose information about your browser’s tabs via that messaging interface and provide updates as you browse the web.
    • The “onboarding” experience is designed as an extremely flexible way to nag you into using products that benefit Avast financially.
    • To make this “onboarding” work, the browser exposes internal APIs to a number of Avast domains that a huge number of third parties can put content on. Not only can each of these third parties abuse this access, a single XSS vulnerability will extend the access to any website on the internet (no effective CSP protection).

    Enjoy!

    #avast #avg #avira #ccleaner #securebrowser #infosec

  15. It has been a while since I’ve written about Avast, so today I give you “How insecure is Avast Secure Browser?”

    palant.info/2024/07/15/how-ins

    Note: This isn’t a vulnerability disclosure, merely an overview of problematic design decisions.

    TL;DR from the article: I wouldn’t run Avast Secure Browser on any real operating system, only inside a virtual machine containing no data whatsoever.

    Some highlights:

    • Eleven pre-installed browser extensions but only two visible to users.
    • Two extensions unnecessarily relax Content-Security-Policy protection.
    • One of these two extensions also requesting all privileges possible, despite not actually using them.
    • Two extensions accept messages from any other extension and any Avast website, the latter without enforcing HTTPS connections.
    • One of these extensions, Privacy Guard (sic!), will expose information about your browser’s tabs via that messaging interface and provide updates as you browse the web.
    • The “onboarding” experience is designed as an extremely flexible way to nag you into using products that benefit Avast financially.
    • To make this “onboarding” work, the browser exposes internal APIs to a number of Avast domains that a huge number of third parties can put content on. Not only can each of these third parties abuse this access, a single XSS vulnerability will extend the access to any website on the internet (no effective CSP protection).

    Enjoy!

    #avast #avg #avira #ccleaner #securebrowser #infosec

  16. It has been a while since I’ve written about Avast, so today I give you “How insecure is Avast Secure Browser?”

    palant.info/2024/07/15/how-ins

    Note: This isn’t a vulnerability disclosure, merely an overview of problematic design decisions.

    TL;DR from the article: I wouldn’t run Avast Secure Browser on any real operating system, only inside a virtual machine containing no data whatsoever.

    Some highlights:

    • Eleven pre-installed browser extensions but only two visible to users.
    • Two extensions unnecessarily relax Content-Security-Policy protection.
    • One of these two extensions also requesting all privileges possible, despite not actually using them.
    • Two extensions accept messages from any other extension and any Avast website, the latter without enforcing HTTPS connections.
    • One of these extensions, Privacy Guard (sic!), will expose information about your browser’s tabs via that messaging interface and provide updates as you browse the web.
    • The “onboarding” experience is designed as an extremely flexible way to nag you into using products that benefit Avast financially.
    • To make this “onboarding” work, the browser exposes internal APIs to a number of Avast domains that a huge number of third parties can put content on. Not only can each of these third parties abuse this access, a single XSS vulnerability will extend the access to any website on the internet (no effective CSP protection).

    Enjoy!

    #avast #avg #avira #ccleaner #securebrowser #infosec

  17. It has been a while since I’ve written about Avast, so today I give you “How insecure is Avast Secure Browser?”

    palant.info/2024/07/15/how-ins

    Note: This isn’t a vulnerability disclosure, merely an overview of problematic design decisions.

    TL;DR from the article: I wouldn’t run Avast Secure Browser on any real operating system, only inside a virtual machine containing no data whatsoever.

    Some highlights:

    • Eleven pre-installed browser extensions but only two visible to users.
    • Two extensions unnecessarily relax Content-Security-Policy protection.
    • One of these two extensions also requesting all privileges possible, despite not actually using them.
    • Two extensions accept messages from any other extension and any Avast website, the latter without enforcing HTTPS connections.
    • One of these extensions, Privacy Guard (sic!), will expose information about your browser’s tabs via that messaging interface and provide updates as you browse the web.
    • The “onboarding” experience is designed as an extremely flexible way to nag you into using products that benefit Avast financially.
    • To make this “onboarding” work, the browser exposes internal APIs to a number of Avast domains that a huge number of third parties can put content on. Not only can each of these third parties abuse this access, a single XSS vulnerability will extend the access to any website on the internet (no effective CSP protection).

    Enjoy!

    #avast #avg #avira #ccleaner #securebrowser #infosec