article thumbnail

Avast Announces Termination of Data Collection Subsidiary

Adam Levin

Avast will phase out Jumpshot, a subsidiary that sells user browsing data gleaned from its antivirus and security products. . “I No reasonable person would expect antivirus software to be selling off their private browsing data to the highest bidder,” said a spokesperson for Sanders. .

article thumbnail

Avast Subsidiary Sells User Browsing History

Adam Levin

A subsidiary of Avast antivirus is selling sensitive user browsing data to many companies, including Revlon, Microsoft, Google, Yelp, Condé Nast, and TripAdvisor. According to the Motherboard article, “multiple Avast users… were not aware Avast sold browsing data, raising questions about how informed that consent is.”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FTC charged Avast with selling users’ browsing data to advertising companies

Security Affairs

US FTC charged cyber security firm Avast with harvesting consumer web browsing data through its browser extension and antivirus and sold it. The antivirus firm is accused of selling the data to advertising companies without user consent. ” re ads the FTC’s complaint.

article thumbnail

A Deep Dive Into the Residential Proxy Service ‘911’

Krebs on Security

911 says its network is made up entirely of users who voluntarily install its “free VPN” software. re network uses at least two free VPN services to lure its users to install a malware-like software that achieves persistence on the user’s computer,” the researchers wrote. “The 911[.]re

VPN 311
article thumbnail

NEW TECH: Trend Micro inserts ‘X’ factor into ‘EDR’ – endpoint detection and response

The Last Watchdog

Trend Micro is among the top five endpoint security vendors who’ve been in the battle since the earliest iterations of antivirus software, more than three decades ago. To be sure, legacy antivirus solutions were designed in an earlier age, based on the notion of prevention, and that was a valid approach in the early 2000s.

Antivirus 147
article thumbnail

What is not included in a Cyber Insurance Policy

CyberSecurity Insiders

From the client’s side, all PCs must have antivirus software and must be kept updated. Some policies do not cover losses incurred by a company indulging in illegitimate data collection of individuals or clients. Otherwise, the cyber insurer will not offer any policy coverage.

article thumbnail

Trusted relationship attacks: trust, but verify

SecureList

Event Description 1 Gaining access to service providers In most cases, the hack started by exploiting vulnerabilities in software accessible from the internet ( Initial Access , Exploit Public-Facing Application, T1190 ). AnyDesk allows you to register this software as a service. Thirdly, such utilities are quite difficult to track.

VPN 89