Latest Articles

Featured Stories

Welcome to Avira’s Insights Blog

Welcome to Avira’s Insights Blog

Welcome to Avira’s new Insights blog.  Here the Protection Labs team of Avira will share their ideas and opinions on the technologies that power the cyber-security industry.

2 weeks ago 1 min read
Machine Learning

Applying AI: getting underneath machine learning

Applying AI: getting underneath machine learning

Machine learning (or artificial intelligence) is a must-have for scaling malware detection. But what type of machine learning should you look for, and how should it be applied?

2 weeks ago 3 min read
IoT

What’s so dystopian about a smart TV?

What’s so dystopian about a smart TV?

Smart TVs know a lot about their owners, should their owners trust them?  A way to intelligently monitor and control the trustworthiness of IoT devices like smart TVs is needed.

3 weeks ago 2 min read
IoT

Turning up the heat on the smart thermostat

Turning up the heat on the smart thermostat

A smart thermostat and the team in the datacenter that supports it, knows a lot about the user – perhaps too much. The potential for hacking incidents to occur underlines the importance of security for all of our connected devices.

3 weeks ago 3 min read
IoT

Should I be (more) paranoid after my IoT Christmas?

Should I be (more) paranoid after my IoT Christmas?

A comprehensive approach to mitigate the problem of an insecure smart home is to secure the network. This is in contrast to a single-minded focus on securing individual IoT devices, which will not be possible, for a long time yet.

3 weeks ago 3 min read
IoT

Beyond the device: securing the IoT

Beyond the device: securing the IoT

Smart homes are probably vulnerable homes: Whose responsibility is it to secure the home – the home owner? The manufacturer of the device? How about the Internet service provider – after all, they are likely to suffer more than most when things go wrong.

3 weeks ago 3 min read

We think you will find interesting

Machine Learning

Applying AI: getting underneath machine learning

Applying AI: getting underneath machine learning

Machine learning (or artificial intelligence) is a must-have for scaling malware detection. But what type of machine learning should you look for, and how should it be applied?

2 weeks ago 3 min read
IoT

Should I be (more) paranoid after my IoT Christmas?

Should I be (more) paranoid after my IoT Christmas?

A comprehensive approach to mitigate the problem of an insecure smart home is to secure the network. This is in contrast to a single-minded focus on securing individual IoT devices, which will not be possible, for a long time yet.

3 weeks ago 3 min read
Featured Stories

2018: Watch your step when the chips are down

2018: Watch your step when the chips are down

2018 will be a year of change: GDPR, threats to the IoT, nation states, feeling increasingly threatened by cryptocurrencies and the Internet giants…

3 weeks ago 3 min read
Featured Stories

2017: Threats got more precise – and pervasive

2017: Threats got more precise – and pervasive

2017 was a transitional year as the online threats and malware grew increasingly focused on individual population segments, and government-funded software exploits escaped their secure confines and wreaked havoc around the globe. This is the year in numbers…

3 weeks ago 3 min read