Free Antivirus declared the winner in the Stiftung Warentest’s comparison test

The Stiftung Warentest just published the results of the test for the Internet security products.



We are happy to announce that


Avira Free Antivirus 2014 has received the result GOOD (2..2) and is the winner of the category free antivirus.



Avira Internet Security Suite 2014 has received the result

GOOD (2.1)  and reached the second place out of 13 products tested.

Both products were praised for

- a good usability

- a good user manual

- good performance (not overloading the computer)

- good detection


Sorin Mustaca

Product Manager and IT Security Expert


How to enable two-factor authentication for Tumblr

More and more social media websites and not only are enabling two-factor authentication in order to secure their users better. Following all other major portals, now also Tumblr allows users to enable it.




Here is how to activate it in easy steps:

  1. Visit your account settings.
  2. Click the “Two-factor authentication” switch.
  3. Enter your phone number.
  4. Now decide whether you’d like to receive the code via text or through an authenticator app. We recommend both in case you need to use one as a backup.
  5. Follow the steps laid out in the settings page.

After you’ve enabled it, you need to login in the future  like this:

  1. Log in to your Tumblr account using your username and password.
  2. Once you’ve received the unique code (either via SMS or through an authenticator app), enter the code in the specified field.

By the way, did you notice that by default the website is not using SSL? Please click on the “Enable SSL security” switch to turn it on by default for future logins.


How will Two-Factor Authentication work when you log in through iOS or Android apps?

When you have two-factor authentication turned on, you’ll need to generate a special one-time-use password in order to log in through your mobile apps. You can generate one through your Account Settings page.


What happens if you disable Two Factor Authentication?

We strongly advise against this. But if you must, you’ll be asked  to enter your account password to make sure it’s really you. You’ll then be able to log in to your account without the extra verification step. If you would like to re-enable it at any point, you’ll have to go through the aforementioned setup process again.


Which authenticator apps to use?

Tumblr recommends Google Authenticator, which you can download for iOS and Android.


Learn here how to activate two-factor authentication for other services as well.
If you want to improve your overall security, check out our Improve Your Security series.


Sorin Mustaca

IT Security Expert

Goodbye, Windows XP?

Microsoft will end the support for Windows XP, but the world won’t end because of this.

In this article we will analyze what can happen, what you should do to avoid any damages and what you can do to continue to use Windows XP even after the support ends.




No more technical updates

After April 8, 2014, technical updates for Windows XP will no longer be available, including automatic updates that help protect your PC. Microsoft will also stop providing Microsoft Security Essentials for download on Windows XP on this date. If you already have Microsoft Security Essentials installed, you will continue to receive antimalware signature updates for a limited time, but this does not mean that your PC will be secure because Microsoft will no longer be providing security updates to help protect your PC.

Microsoft released XP about 12 years ago and published also a lot of patches in this time. Does this mean that all vulnerabilities were found and fixed? Most definitely not. As a matter of fact, Microsoft Trustworthy Computing director, Tim Rains, said that the cybercriminals can go so far and even reverse-engineer patches for more modern and supported versions of Windows in order to see what remained unpatched in Windows XP. Even if Windows 7 and 8 are quite different than Windows XP, there is still a lot of code shared between these operating systems.

If you continue to use Windows XP after support ends, your computer will still work but it might become more vulnerable to security risks and viruses. You can even install a fresh copy of Windows XP even after April 8th.




I hope it is clear by now that Microsoft is not going to go back and review their decision to kill the operating system. The only question now is: What to do ?




The best solution is clearly to move away from Windows XP. There are plenty of resources and tutorials in the Internet that explain how to migrate to Windows 7 or 8.  But be aware that this might come with additional costs, since these operating systems require better hardware than Windows XP.




Hardening is the process applied to a computer to reduce its attack surface. Reducing the attack surface means identifying and reducing the available ways to attack the computer. Typically this includes the removal of unnecessary software, unnecessary logins and the disabling or removal of unnecessary services (file and print sharing, media center). On a lower level, it means also closing all non-critical ports, removing any not needed driver, ideally, removing the computer from the Internet completely.

Also the software that is used must be made as secure as possible. This means run it in a sandbox, run with minimum or completely without extensions, addons or plugins and in general, reduce the functionality which is not strictly needed.

Also the risk created by the one who stays in front of the monitor, the user, must be reduced. Create better passwords, change the default passwords, make them expire after a month. Use an account without administrative rights in order to reduce the damage of an attack happening under your account.

The software that users install must be checked thoroughly from now on, as there is no guarantee that they are backward compatible with an now obsolete operating system. Ideally, use only software created for Windows XP.

Speaking of software, make sure you keep your software (which is the bare minimum needed to do your job) up to date. Don’t use default installed programs like Outlook Express, Internet Explorer, Media Player as they might contain vulnerabilities that can get exploited. The best in this case are Mozilla Thunderbird as replacement for Outlook Express and Chrome or Firefox for replacing Internet Explorer. For Media Player there are thousands of replacements online.

Last, but definitely not least, install and keep updated a security product like Avira Free Antivirus.

If your Windows XP holds business critical information on it (but why would you trust an obsolete operating system with such a task?) then isolate the computer in the network. This means that you should filter the traffic coming from the exterior to your vulnerable computer using some gateway filtering product.




Another method to continue to run a Windows XP without having to expose it completely is to run it in a virtual machine on an up to date host operating system. This way you have a secure underlying operating system which you can easier protect than the XP.

If you have a PC with XP installed and there are your good old programs that run since many years, there is a solution to virtualize that as well.

Use Disk2VHD from Microsoft to create a virtual hard machine and play it with the free Microsoft Virtual PC under a safer operating system like Windows 7 or Windows 8. This program will create a snapshot of your installed Windows XP, including all programs, registries, files and will clone them in the virtual machine. The result is an identical environment with the real one, only that it is virtual.

In any circumstance, make sure though that even you harden the XP machine, no matter if it is real or virtual.


Our recommendation


We strongly recommend to migrate from Windows XP. There is no way to fully protect the operating system anymore. There is nothing (or at least nothing that is economic feasible) that you or security experts can do to protect it.

And don’t think that you necessary have to stick with Windows. If you don’t have to use some legacy software that runs only on XP, think about alternatives. Linux distributions like Ubuntu (and flavours) have become really good as a desktop operating system.


Sorin Mustaca

IT Security Expert

Avira Protection Cloud available now for Free Antivirus

In order to ensure that our customers are using the best protection available, we integrated the Avira Protection Cloud  in all our premium products (consumer and business) .

Avira takes now the next step and offers the best protection available to all its users: real-time scanning of programs with the Avira Protection Cloud.

We are proud to announce the integration of the Avira Protection Cloud in the Free Antivirus product.


The goal is to check only unknown, new programs that come from potential dangerous sources. This way, the system is protected against the latest threats, even between regular product updates..

Read here  how this feature works and how it can be configured.

All existing Avira Free Antivirus installations will get this update for free, completely transparent for the user. Most of the time, the feature will remain unnoticed because the product is configured to bother the user as less as possible.


About Avira Protection Cloud:


About the Real-time protection with Avira Protection Cloud:



Sorin Mustaca

Product manager, IT Security Expert


Thank you for reading this post on Avira TechblogFor latest news please follow us on FacebookTwitterGoogle+.

Avira Free Mac Security – Update 3 released

 The Free Mac Security gets the Update 3 bringing performance improvements together with some stability improvements and additional features.

The update comes automatically via the standard product update and it doesn’t require a reboot.


Screen Shot 2014-01-08 at 11.03.50  

Performance improvements

We know that the product had some performance issues when the Time Machine or another backup program was running.

The analysis allowed us to improve the overall performance of the system when backup programs like Dropbox, Avira Secure Backup and others run, but especially when the built-in Time Machine from Apple performs a backup.

During the backup, the product manages to intelligently avoid the intercepting of the file accesses produced by the backup programs.


Real-time protection Improvements

Due to several improvements in the scanning process, the on access scanning has been improved with about 5% when compared with the currently released version.

And this is just the beginning. Expect in the future versions to see even more such improvements.

The biggest advantage is seen when scanning either large files or when scanning complex documents (e.g.: embedded documents).


Apple Notification Center for Real-time notifications

Until now it, when the product detected some threats it blocked and quarantined them by default without visually reporting anything to the user. While this is enough for many users, we wanted to let the user know that the product is there and it protects continuously. In this version we included the Malware Detection Notification in the Apple Notification Center.

When the product protected you against a threat, you will see in the right side of the screen a notification like the one below:


If you click on the Notification Center, you see the list of events that were reported. The good part here is that the product doesn’t immediately report every single notification, so if you have multiple malware detected (like during a file copy operation) you will see only one event which contains multiple detections reported.




Help topics are now available via online help

In order to be able to help you better and faster with up to date information, we extended the help with an online help. But, don’t worry, if you are offline, you still get access to the offline help as before.


Along with these great additions, we performed a lot of improvements in:

-          Graphical User Interface stability

-          Quarantine management

-          Uninstallation procedure

-          Real-time detection

Are you convinced to give the product a try? Then download it from here.



Sorin Mustaca

Product manager, IT Security Expert



Thank you for reading this post on Avira TechblogFor latest news please follow us on FacebookTwitterGoogle+.

Apple fixes the SSL bug for MacOSX

Following the criticism from the media and security experts, Apple delivered what it promised: a fix to the already famous “goto fail” bug in the SSL implementation in their products.

Apple Logo

All MacOSX users should update their software accordingly.

Make sure you get the 10.9.2 update for MacOSX 10.9 and Security Update 2014-001.

Seeing how many fixes it contains, I am quite surprised that they managed to deliver the patch so quickly. This can only mean that this bug is well-known since quite a while to Apple, but they waited to deliver the fix it with the other fixes. It would make much more sense to deliver just this fix immediately to protect the customers.

Please visit the dedicated KB article to see what else was patched beside the epic “goto fail“.


If you want a great protection for your Mac, consider installing our Free Mac Security product. We guarantee that we don’t have such bugs. :)


Sorin Mustaca

IT Security Expert

Thank you for reading this post on Avira TechblogFor latest news please follow us on FacebookTwitterGoogle+.

Apple patches a dangerous SSL bug in iOS

Apple released on Friday, February 21st, a software update with version 7.0.6 to fix a security issue in various iOS versions. This security bug allows attackers to act as a man-in-the middle: read and modify the encrypted communication on iPhone, iPad, iPod. The company says it is working also on the fix for OSX.

According to the KB article, the Secure Transport failed to validate the authenticity of the connection. This issue was addressed by restoring missing validation steps.

What does this mean?

When a device talks SSL/TLS with a server, it must do several steps to make sure that the server is who it says it is. Because of this bug, the iOS device would blindly trust a server no matter what it pretends it is as long as it presents a valid SSL certificate (generated by a trusted certificate authority). For example, if you do your online banking, a man-in-the-middle attack would be successful if the fake server manages to present a certificate that impersonates the bank’s servers. With so many CAs hacked in the past, it is not impossible to impersonate pretty much any entity in the Internet.


What to do

You need to trigger an update of iOS.

If  you don’t see a message like the one below, go to Settings -> General -> Software Update and trigger the update manually.



This is what you should see when the device detects the update. Note that the update can only be done when the iOS device is connected to a wireless network.




Other iOS Devices

Also other iOS devices got the update: Apple TV, iPad v2+, iPod last generation, iPhone 4+. For a complete list please check the dedicated support page.

Name and information link Released for Release date
Apple TV 6.0.2 Apple TV 2nd generation and later 21 Feb 2014
iOS 7.0.6 iPhone 4 and later, iPod touch (5th generation), iPad 2 and later 21 Feb 2014
iOS 6.1.6 iPhone 3GS, iPod touch (4th generation) 21 Feb 2014


Apple hasn’t fix the bug yet for MacOSX. Even though Avira can’t protect you against this issue, you should still install Avira Free Mac Security (if you haven’t done this yet).


Sorin Mustaca

IT Security Expert

Thank you for reading this post on Avira TechblogFor latest news please follow us on FacebookTwitterGoogle+.

Continuous attacks on routers and connected devices

In the last few months we have been flooded with reports about vulnerability and exploits on Internet connected devices such as routers, house automation devices (light switches), Point of Sale (POS) devices.

Let’s briefly review what has happened in this time:


AVM’s Fritz.Box

avm fritz


The sources in the media report that the patches that AVM, the producer of the routers delivered for all devices, were actually fixing another problem. The initial reports were mentioning that the vulnerability is related to remote access functionality in the router. Simply disabling it would have solved the problem, but the latest reports show that even without the remote control enabled, the routers are vulnerable. The only solution is to patch the devices with the latest firmware. Those who don’t know how to do this, must read the detailed instructions here (DE, EN).





Belkin produces many products, but the house automation products (WeMo) and routers. The last vulnerability in the WeMo devices allows an attacker to overwrite the firmware and remote control the devices. The solution is not known at the moment, sources report that the only way to avoid an attack is either to shut down the device or to not allow access from the Internet.


Other routers: Asus, LinkSys, D-Link

Asus: allows attackers access to resources shared in the internal network

LinkSys: hit by the work TheMoon.

D-Link: allows unrestricted login through a backdoor

All these devices have known vulnerabilities and many of them are unpatched since months. A simple search in your favorite search engine after “<device> vulnerability” will give you hundreds or thousands of article about reports of vulnerabilities.




Not many, unfortunately.

The most obvious is to trigger a firmware update whenever possible and hope that the producer of the device has fixed the vulnerabilities.

If this is not the case, the mitigation of these risks is usually related to the access from the Internet, but not always. Whenever possible,  try to deactivate the remote access. Note that this doesn’t restrict in any way the functionality of the device, but it might restrict some of the functions. For example, some devices have mobile apps that remotely control the device. If such a configuration is done, these apps might not work anymore.

Some routers offer functionalities like Web server, FTP server, ActiveSync, iTunes sync, “Cloud Disk”, “Smart Access”, “Guest Access”, “Own Cloud”, “Media Streaming” and alike. All these have one thing in common: they allow access from the Internet via various protocols.

Whatever functionality your router has, if you are unsure what these functions do, just deactivate them.


Sorin Mustaca
IT Security Expert

 Thank you for reading this post on Avira TechblogFor latest news please follow us on FacebookTwitterGoogle+.

Kickstarter hacked, loses control over customer data

In an email with the subject “Important Kickstarter Security Notice” sent to all customers, the CEO of  the company announced that on Wednesday, Feb 12, 2014, law enforcement officials contacted Kickstarter and alerted them that hackers had sought and gained unauthorized access to some of customers’ data.


How come that the law enforcement contacts the company to inform them about the breach? How did they find out that the company was hacked? I asked to provide more details. Let’s see if they reply.

Anyway, the good news is:

No credit card data of any kind was accessed by hackers. There is no evidence of unauthorized activity of any kind on your account.

The bad news is:

Accessed information included usernames, email addresses, mailing addresses, phone numbers, and encrypted passwords.

Make sure you change your password. If you used the same password and email address on other services, make sure you create a different password. Here you can learn how to make good passwords.

For more tips how to do this, check


Sorin Mustaca

IT Security Expert

Thank you for reading this post on Avira TechblogFor latest news please follow us on FacebookTwitterGoogle+.

Free Antivirus and Professional Security on Windows 8.1 receive the Virus Bulletin 100% award

Virus Bulletin has published the “VB 100% Comparative review on Windows 8.1” and we are happy to announce that Avira Free Antivirus and Avira Professional Security have received the Virus Bulletin 100% award.



There is not much to say about the results, except that they are flawless – 100% detection, 0 false positive and a very good 84% at the RAP test.


According to the VB, scanning was “pretty speedy for the most parts”, “RAM use was low”, “Detection was very strong as usual”.

Avira didn’t miss any VB100% award for the last few years.

Want to enjoy the flawless protection? Get your product today.


Sorin Mustaca

IT Security Expert

 Thank you for reading this post on Avira TechblogFor latest news please follow us on FacebookTwitterGoogle+.