|By Business Wire||
|February 7, 2013 11:52 AM EST||
Whether you decide to give flowers, chocolates or something a little more unusual as the perfect symbol of your affection this Valentine’s Day, make sure you take extra precautions when ordering online. That’s the advice being given by AVG Technologies N.V. (NYSE: AVG). AVG warns that as more and more expressions of love are being bought online, buyers’ heightened states of emotion may bring increased risks to their browsing computer or mobile device, and their online identity.
Tony Anscombe, AVG’s Senior Security Evangelist, explains: “The kinds of emotions involved in Valentine’s Day preparations, whether love or total panic in some cases, can often cause people to act without their usual level of care. The danger is that we become so focused on the act of giving or receiving affection that we become less alert to the tricks of cybercriminals looking to prey on our vulnerabilities and our inattention.
“Young or old, we all still love the idea of having an admirer. The consequence of this is that we are much more likely to accept an unsolicited Facebook friend request or email offer, if sent at the right time of year,” Anscombe continues.
Valentine’s Day is one the largest days of the year for online retailers and for online cybercriminals who try to take advantage of the increased activity to cause as much damage as possible through their various tricks of the trade. Viral posts through social media are the new spam email, as are Twitter worms such as “Are these pictures of you?” Invitations to download apps ‘designed’ for Valentine’s Day can be a trap, particularly if you accept them from free marketplaces. Spam and e-greeting cards also continue to be popular in the lead up to Valentine’s Day simply because they are effective at tricking people into clicking on and opening malicious links.
Cybercriminals may also try to target unsuspecting users thanks to impulse message sending via unfamiliar sites and last minute gift purchasing. Enticements such as “Order online today for fast delivery using this special discount code” could solve your problem, as long as the fast delivery they’re promising is for flowers and not for malware.
With so many teens and adults now browsing and shopping using small screened smartphones and tablets there are risks to online activity because you can’t always see the full web address. Criminals often add to the end of legitimate URL addresses taking shoppers to corrupt sites.
A new danger awaits users of mobile devices: beware QR Codes displaying Valentine’s Day advertisements. The danger lies not in the codes themselves but in what can lie at the other end. When you use your smartphone to scan a QR Code, you are taken directly to the site without its URL being displayed or you being asked first if you want to go there.
Here are AVG’s five safety tips for sending and receiving genuine online affection:
1. Pre-qualify those potentially dodgy email links, e-cards or QR Codes by activating link scanning technologies, such as those embedded in AVG’s AVG AntiVirus Free for Android, that automatically detect malicious sites and halt the action before your phone or tablet becomes infected.
2. Whether using a home computer or mobile device, before entering credit card information to order your flowers, ensure you either recognize the URL or that it begins with “https” to confirm that the site is secure.
3. When you’ve finished buying your sweetheart a sweet treat, consider cleaning the cookies on your computer so you don’t leave a footprint for the crooks.
4. While there are daily reports of ‘harmless’ social media pranks, Valentine’s Day provides additional avenues for bullies. Always log out and make sure you’re using a good strong password or passphrase so someone else can’t access your account pages.
5. Don’t break someone’s heart or bank account by unintentionally sharing a malicious link with friends – they can so easily go viral on Facebook and Twitter.
About AVG Technologies (NYSE: AVG)
AVG’s mission is to simplify, optimize and secure the Internet experience, providing peace of mind to a connected world. AVG’s powerful yet easy-to-use software and online services put users in control of their Internet experience. By choosing AVG’s software and services, users become part of a trusted global community that benefits from inherent network effects, mutual protection and support. AVG has grown its user base to 143 million active users as of September 30, 2012 and offers a product portfolio that targets the consumer and small business markets and includes Internet security, PC performance optimization, online backup, mobile security, identity protection and family safety software.
Keep in touch with AVG
- For breaking news, follow AVG on Twitter at www.twitter.com/officialAVGnews
- For small business security trends analysis, follow the AVG small business blog at small-business.blog.avg.com
- Join our Facebook community at www.facebook.com/AVGfree
- Join our LinkedIn community www.linkedin.com/groups?gid=2719797
The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential. The DevOps Summit at Cloud Expo – to be held June 3-5, 2015, at the Javits Center in New York City – will expand the DevOps community, enable a wide...
May. 25, 2015 03:00 PM EDT Reads: 1,729
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
May. 25, 2015 03:00 PM EDT Reads: 4,084
There is no question that the cloud is where businesses want to host data. Until recently hypervisor virtualization was the most widely used method in cloud computing. Recently virtual containers have been gaining in popularity, and for good reason. In the debate between virtual machines and containers, the latter have been seen as the new kid on the block – and like other emerging technology have had some initial shortcomings. However, the container space has evolved drastically since coming on...
May. 25, 2015 02:45 PM EDT Reads: 1,058
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar...
May. 25, 2015 02:00 PM EDT Reads: 4,648
The 17th International Cloud Expo has announced that its Call for Papers is open. 17th International Cloud Expo, to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, APM, APIs, Microservices, Security, Big Data, Internet of Things, DevOps and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding bu...
May. 25, 2015 02:00 PM EDT Reads: 4,111
Cloud Expo, Inc. has announced today that Andi Mann returns to DevOps Summit 2015 as Conference Chair. The 4th International DevOps Summit will take place on June 9-11, 2015, at the Javits Center in New York City. "DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited to help the great team at ...
May. 25, 2015 02:00 PM EDT Reads: 1,473
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo, June 9-11, 2015, at the Javits Center in New York City. Learn what is going on, contribute to the discussions, and ensure that your enter...
May. 25, 2015 01:15 PM EDT Reads: 1,770
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.
May. 25, 2015 01:00 PM EDT Reads: 925
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
May. 25, 2015 01:00 PM EDT Reads: 6,130
There is no doubt that Big Data is here and getting bigger every day. Building a Big Data infrastructure today is no easy task. There are an enormous number of choices for database engines and technologies. To make things even more challenging, requirements are getting more sophisticated, and the standard paradigm of supporting historical analytics queries is often just one facet of what is needed. As Big Data growth continues, organizations are demanding real-time access to data, allowing immed...
May. 25, 2015 12:30 PM EDT Reads: 2,774
Enterprises are fast realizing the importance of integrating SaaS/Cloud applications, API and on-premises data and processes, to unleash hidden value. This webinar explores how managers can use a Microservice-centric approach to aggressively tackle the unexpected new integration challenges posed by proliferation of cloud, mobile, social and big data projects. Industry analyst and SOA expert Jason Bloomberg will strip away the hype from microservices, and clearly identify their advantages and d...
May. 25, 2015 12:00 PM EDT Reads: 1,274
Container frameworks, such as Docker, provide a variety of benefits, including density of deployment across infrastructure, convenience for application developers to push updates with low operational hand-holding, and a fairly well-defined deployment workflow that can be orchestrated. Container frameworks also enable a DevOps approach to application development by cleanly separating concerns between operations and development teams. But running multi-container, multi-server apps with containers ...
May. 25, 2015 12:00 PM EDT Reads: 1,784
Software Development Solution category in The 2015 American Business Awards, and will ultimately be a Gold, Silver, or Bronze Stevie® Award winner in the program. More than 3,300 nominations from organizations of all sizes and in virtually every industry were submitted this year for consideration. "We are honored to be recognized as a leader in the software development industry by the Stevie Awards judges," said Steve Brodie, CEO of Electric Cloud. "We introduced ElectricFlow and our Deploy app...
May. 25, 2015 12:00 PM EDT Reads: 1,592
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
May. 25, 2015 12:00 PM EDT Reads: 4,081
SYS-CON Events announced today that DragonGlass, an enterprise search platform, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. After eleven years of designing and building custom applications, OpenCrowd has launched DragonGlass, a cloud-based platform that enables the development of search-based applications. These are a new breed of applications that utilize a search index as their backbone for data...
May. 25, 2015 12:00 PM EDT Reads: 1,726