avast! 2014 released
Posted on 18 October 2013.
AVAST Software launched avast! 2014 – the latest version of the antivirus solution used by a quarter of all protected PCs worldwide. The new version improves performance, download and install times, privacy, and protection.

Avast! 2014 offers a new Do Not Track function in the avast! browser plugin. This technology lets users decide which companies they will allow to track their online behavior. For AVAST subscription products, SafeZone provides additional security for financial transactions.

Additionally, avast! 2014 offers even stronger protection with DeepScreen technology. This allows avast! to clear away false code, misdirections, and other techniques malware creators use to mask the true intentions of their malware. By peeling away layers of obscure code, avast! 2014 is able to observe the binary level commands within the malware to better understand the hidden instructions embedded in it.

New in avast! 2014 is the Hardened Mode feature, which lets users switch on a whitelisting mode that blocks files from executing when it is unclear whether they are infected or not.

The latest version also empowers users to create a bootable antivirus USB, CD or DVD. That way if anything happens to their PC, the user has the disk ready so they can clean and restore their PC to normal function. The Rescue Disk is built on Windows PE (pre-installation environment) which allows users to boot a PC even when there is no functioning OS. The Rescue Disk function is available in all avast! products and is an integral part of the new remediation module introduced by this new version.

AVAST has also redesigned the entire user interface based on input from its customers. Users will find it simple and straightforward, making it easy to find everything they need. Additionally, the interface puts everything in the same place for both the Free and Paid product lines, making migration easier.

“The avast! 2014 solution is a big step forward,” said AVAST Chief Technology Officer Ondřej Vlček. “We now stream more than 250 micro-updates to active devices each day to improve zero-day detection and prevention. By protecting the most devices we have the best insight into the threat landscape, and that translates into better protection for our users.”





Spotlight

Targeted attack protection via network topology alteration

Posted on 17 October 2014.  |  This article from Trend Micro tackles how network topology can aid in defending the enterprise network from risks posed by targeted attacks.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Oct 20th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //