Back in Black malware at your power company could put out the lights

crashoverride-malware

Tags :- Avira Tech Support | Avira Support NumberAvira Refund.

Malware can do more than just hold up your device for ransom; they just might flip off the electrical power switch for an entire city. New malware is targeting the power grid infrastructure, say analysts, and this first attack is likely just a taste of what could come in the future.

The malware, called Industroyer or Crash Override, came into view in late 2016 when it knocked about 700,000 homes off the grid for few hours outside the Ukrainian city of Kiev. And that’s the good news. The bad news is that this malware knows its way around the power grid, can send out malicious commands to mission-critical equipment, and once configured and deployed, can be scaled out without direct hacker involvement.

There’s a SCADA in the lightswitch

This attack targeted several SCADA protocols used in Europe. SCADA, short for Supervisory Control and Data Acquisition, is the system of hardware and software controls behind almost every industrial process. Once activated, the Crash Override malware cycles through a range of circuit-breaker addresses, trips them, then repeats the process.

Malware targeting SCADA was not a big surprise. With origins dating back to intersection of manual controls and mainframe computers – it has been described as “insecure by design” by experts. Efforts to make SCADA more secure are something like putting a band-aid on a chest wound.

Following an even earlier hacker attack (also in Ukraine) on the power grid, the industry has taken a two-pronged approach: trying to prevent attacks and, almost more importantly, getting quickly back online afterwards.

Tidy hackers at work

Investigators aren’t exactly sure who wrote this malware – although some fingers are pointing towards Russia. What they are sure of is that these hackers did tidy work – without recycling old code or leaving digital fingerprints behind – and that more events are coming. There simply have been too many resources invested in creating this malware for this to be a one-off event. Besides, the malware has additional features and payloads not even activated this time. Investigators have raised the specter that this attack was just a POC (Proof of Concept) for getting the bugs ironed out of the malicious software before they move on to a real target.

Electrifying points to consider

Most people, myself included, are absolute strangers to the intricacies of high voltage systems. However, there are three points from this event that are applicable to everyone online.

  1. It can happen to you – The simple awareness that bad things can indeed happen is critical – for both power managers and individuals.
  2. Be prepared for bad events – Preventing or reducing the damage means having an action plan prepared. For this malware, Dragos recommended having robust backups of engineering files. For the average computer user, preparation should mean a combination of having files backed up, antivirus software in place, and software fully updated.
  3. Stay involved – “Human defenders are required” is the last line of the Dragos report. This is true for your online security. The best defense against a social engineering or customized spear-phishing attack is you.

Source : blog.avira.com

Avira Tech Support : Blog

A short time ago, in a Galaxy, Mac, and Windows device not far, far away

luke-filewalker

Tags :- Avira Tech Support | Avira Support NumberAvira Refund.

There is an upheaval in the Force and Luke File walker is on the move. A malicious horde from the Dark Side has invaded, subverting minds, stealing data, and emptying bank accounts. To counter this threat, Luke is going through millions of devices, scouring them for suspect code and cleaning up the damage left behind. He is guided on this critical journey by the whispering of the Force, the power of artificial intelligence, and a small support crew at a remote outpost.

Luke Filewalker is alive and active…

…and we don’t even need that missing  map piece of the right star system to find him. He has been located on one relatively insignificant planet rotating about a star in the Orion arm of the Milky Way galaxy which is itself in the Local Galaxy group within the Virgo Supercluster of galaxies.

Got that? It’s the third rock from the sun – not the red one.

Luke Filewalker is the auto scan and repair component within Avira Antivirus. Every week, Earth week that is, Luke automatically checks the millions of computers where Antivirus has been installed and looks for signs of the Dark Side. If he finds anything suspicious, he can root it out himself or call in reinforcements. And if Antivirus detects unusual signs of Dark Side activity with its real-time protection elements, Luke will jump into action as needed.

His origins within Avira Antivirus have been lost in the murky beginnings of the Computer Era. “‘Luke Filewalker’ is definitely more than 20 years old and was already in use on a lot of different operating systems,” said Sven Carlsen, team leader of disinfection services at the Avira Protection Services.

A short time ago, in a Galaxy, Mac, and Windows device not far, far away …

In each covered device, Luke Filewalker is there to do a quick, full, or other custom scan. The quick scan looks into the most important and essential system locations. It also checks the usual infection paths used by malware. The full scan goes over the complete system. And the other is for customized scan profiles on the device such as scanning “My Documents” or a scan of removable devices. The decision to run each type of scan is primarily automated within Avira Antivirus (when certain requirements are met) without requiring user involvement – unless the user wants to start a special scan.

Once the scan is finished and it detects a malware or unwanted application, the repair will start working. The repair will look for all the leftovers from the malware in order to fix and clean up the mess left by the malicious file.

Luke’s discoveries have varied over time as the forces of the Dark Side have shifted from relatively primitive Trojans into botnets enslaving millions. “He discovers all the threats that we tell him about through our AV engine and AI analysis. Currently, his most common discovery is ransomware,” pointed out Sven.

Luke listens to the Force for directions on discerning the identity and intent of suspect code. Otherwise known as the Local Decider, this Antivirus component decides if suspicious files need to be uploaded to the Avira Cloud – not the Oort one — for additional analysis. After AI discerns whether the file is, in fact, malicious or harmless, the message is sent back to the individual device and Luke steps into action as needed. This information about a potential new threat is then relayed to other Avira Antivirus users.

He is visible as Luke Filewalker only for the Windows version of Avira Antivirus. The scanning services in Mac and Android Avira Antivirus remain incognito. But even if you don’t see him – the Force is still with you – and your device.

 Source : blog.avira.com

Avira Tech Support : Blog

Worldwide botnet Avalanche smashed

botnet-avalanche-smashed

Tags :- Avira Tech Support | Avira Support NumberAvira Refund.

According to Europol, victims of malware infections were identified in over 180 countries. The monetary losses associated with malware attacks conducted through the Avalanche botnet are estimated to be in the hundreds of millions of euros worldwide. Computer users can check their devices with the Avira PC Cleanerto see whether their device was infected and part of the botnet. The free tool scans the computer and removes the malicious software. Users who already use Avira anti-virus software are protected against the botnet.

Within the Avalanche botnet, a total of 20 different botnets have been identified. The targeted activity of the international criminal gang was distributing spam and phishing e-mails, as well as spreading ransomware and banking Trojans for tapping account and transaction data as well as stealing passwords.

To play safe: what PC users should do now

Check and clean the PC

If you do not have an anti-virus software installed, you should check your computer for a possible infection using, for example, the free Avira PC Cleaner. If the computer is infected, Avira PC Cleaner will remove the Avalanche botnet code. Avira PC Cleaner also detects if other malicious software is on the computer and will also remove it as well.

If you already have an anti-virus software installed and want to be safe, you can also use Avira PC Cleaner as a “second opinion” to check your system.

Change passwords

After cleaning your PC, change all passwords for online banking/shopping, payment services, e-mail, social networks, and other applications.

Check the Windows security settings

Open the maintenance center via Start -> Run -> wscui.cpl and check that the network firewall, antivirus, spyware protection, and Internet security are all fully active.

Install antivirus software

To protect against future cyber attacks, we recommend installing an antivirus software. With the free Avira Free Security Suite, your PC is reliably protected against botnets and a wide assortment of malicious software. In addition, you can optimize PC performance and securely surf through a VPN client in public Wi-Fis.

 Source : blog.avira.com

Avira Tech Support : Blog

Gooligan steals more than 1m Google accounts

gooligan-steals-google-accounts

Tags :- Avira Tech Support | Avira Support NumberAvira Refund.

You may have read or heard about an Android malware attack campaign named Gooligan.

What is Gooligan about?

The main purpose of Gooligan is to steal Google accounts from devices with Android 4 (Jelly Bean, KitKat) and 5 (Lollipop). Later these accounts are used to promote, rate, and download apps from the Google Play Store – making it a huge advertising fraud scheme. Gooligan roots infected devices and steals authentication tokens that can be used to access data from Google Play, Gmail, Google Photos, Google Docs, G Suite, Google Drive, and more.

That vulnerabilities are used for exploiting a mobile device and putting malicious programs on it, it isn’t something special. It’s a very popular method to compromise a system. And that’s the reason why protecting and updating your system is so important in our digital life. — Mikel Echevarria Lizarraga, Malware Analyst at the Virus Lab at Avira.

According to Checkpoint there are more than 80 malicious Gooligan apps. These apps have stolen more than 1 million Google accounts – and the number is increasing by 13,000 accounts per day!

Google’s director for Android security already published a statement on Google+:

Several Ghost Push variants use publicly known vulnerabilities that are unpatched on older devices to gain privileges that allow them to install applications without user consent. In the last few weeks, we’ve worked closely with Check Point, a cyber security company, to investigate and protect users from one of these variants. Nicknamed ‘Gooligan’, this variant used Google credentials on older versions of Android to generate fraudulent installs of other apps. — Adrian Ludwig, Google’s director of Android Security

Where do these apps come from?

The apps are found in 3rd parties stores, a fact that many may see as a relief. But it’s not! Users can be redirected to these apps while browsing the net and then be asked to install them – and a lot of them do.

Checkpoint states that 57% of the infected devices were detected in Asia. We recommend you to not relax or get comfortable nonetheless because this doesn’t mean that just Asia is being affected by “untrusted” download stores. Untrusted download stores are everywhere, they’re a dime a dozen on the internet. So if you are using other stores beside Google Play you will increase your risk for being affected – no matter if you’re in Asia or not.

We have your back!

Avira free Antivirus for Android has already been protecting you against this threat for several months. Download the app on Google’s Play Store for free!

We also recommend to check the configuration of your Android device, inside the settings > security menu. The options “Unknown sources” and “Verify apps” should be enabled by default. This will avoid the accidental installation of these malware applications.

Source : blog.avira.com

Avira Tech Support : Blog

Avira Free Security Suite – The first free security suite ever!

free-security-suite

Tags :- Avira Tech Support | Avira Support NumberAvira Refund.

Great news everyone: We just introduced the new Free Security Suite — the world’s first free internet software package to combine security, privacy, and speed into a single suite.

“At Avira, we build software that empowers users to manage, secure and improve their digital life. With the new Free Security Suite, everyone will get the world class security they expect from us along with the tools they need to protect their identity, their privacy and keep devices running smoothly.” said Travis Witteveen, Chief Executive Officer of Avira.

Our Free Security Suite is the most comprehensive product ever released for free. It combines an array of award winning services in an integrated package, which allows multiple devices and users to be managed via an easy to use web dashboard. We commit to provide users of the Free Security Suite a continuing flow of updates and features to ensure protection in this fast moving world.

Top-ranked protection against malicious code and ransomware

Ransomware is one of the fastest growing elements in our Global Threat Landscape, with global detections up 196% from May to September 2016. The situation was even more dramatic in the DACH region with detections soaring by 326%.

Avira Free Antivirus sets the benchmark for detecting and stopping a full spectrum of online threats according to independent tests. Powered by AI analysis, users get the latest updates via the Avira Protection Cloud.

Anonymous and private browsing as well as geo-unblocking

People want to go everywhere online, whether this is public Wi-Fi browsing, watching events in foreign countries or following local events while abroad – and do this securely. That’s difficult in open or non-trusted wireless networks and when geo-restrictions limit what can be accessed.

Our Phantom VPN solves this problem by encrypting all communication between a user’s device and the Internet, and stopping cybercriminals from capturing their data. By masking a device’s true IP address, Phantom enables more anonymous browsing and helps unlock geo-restricted content. Employing multiple access points in each country, the Free Security Suite provides enough data volume protection to exceed the needs of any average user; the data volume protection amounts to more than 4 Full HD Movies.

Improved performance: more space, speed and privacy

Computers get slower over time as hard drives fill and registry issues accumulate. It’s often not clear what can be done to remove this digital sludge. Avira System Speedup analyzes a computer’s performance and enables changes to improve performance.

The Speedup toolkit also contains a multitude of features and services which ensure speedy repair and data recovery as well as the removal of undesired trackers by cleaning cache registries.

Stay away from infected websites

Avira also adds an extra layer of protection to your browsing experience with the Avira Browser Safety extension. A multitude of internet threats are browser based but by activating ABS, these threats are blocked from affecting the users. The danger of malicious downloads, phishing, and online fraud is thus eliminated. As an additional benefit, your online shopping experience will be heavily improved, Avira Offers helping you make sure that you get the best price from a trusted store.

Get it together with Auto-update

The Free Security Suite also comes with an Auto-update functionality that will ensure you receive new free apps and product information directly to your Avira Connect dashboard. Thanks to the continuous updates, you will be the first to get new security components and services, as soon as they launch.

 

The Avira Free suite is completely free to install and use. Functionality on some apps such as Speed-up and Phantom VPN is limited. Other Avira free applications are available and can be found in the Connect dashboard.

Source : blog.avira.com

Avira Tech Support : Blog

Privacy: Google My Activity displays collected data

google-my-activity-collected-data

Tags :- Avira Tech Support | Avira Support NumberAvira Refund.

We all know Google loves to collect data. But what kind is really collected and analyzed? Sadly, that’s a question not even we can answer. Google does provide a partial overview of it in Google My Activity though. Depending on your settings you will be able to check out your browsing history, where you were and when you were there, as well as which devices you’re using. It will also allow you to determine in just a few minutes what data you want to allow Google to collect.

To do so, open http://google.com and log in. Call up “My Account” from the menu. The item “Personal info & privacy” will lead you to “Privacy Check-up” and “My Activity”.

Privacy: Google My Activity displays collected data

Google My Activity – overview

Here you will find a list of activities which for example includes your searches on YouTube, the YouTube videos you’ve watched, and more. The data you will see on this page are just visible for you. By the way: If you’re looking for a specific activity, Google offers a search function for your convenience.

Privacy: Google My Activity displays collected data

In our little example we have watched the YouTube video tutorial on “How to install Avira Antivirus”.

Privacy: Google My Activity displays collected data

With one click on “Details” you can see the exact information Google collected for this activity and why. You’re also able to delete such an entry by clicking on the three points above the message.

The menu item “Other Google activity” can be reached via the top left menu. Call up your personal location history, your Google Play Sound Search history, and what devices you’re using. Additionally this is where you can manage (and remove) the YouTube videos you’ve marked as “Not interested”, so that similar videos will show up in your search again. You will also be able to download your search activity in archived form.

In June 2014 I’ve spent some wonderful days on Lanzarote. Dabbling with “Location History” in Google My Activity can help taking you on a trip down memory lane. Google displays its location history very simplified though – so it’s up to you to conjure up the according moments.

Privacy: Google My Activity displays collected data

Activity Controls

Beside the other items the top left menu also gives you control about your activities on Google. Administrate your settings concerning several histories and activities. To activate or deactivate a feature you can use the slide control that you will find on the top right of each paragraph.

What kind of person are you? Do you care who collects your data? And if you do – do you avoid those who collect what they can?

Source : blog.avira.com

Avira Tech Support : Blog

Christmas 2017: how to protect your online purchases

christmas-protect-online-purchases

Tags :- Avira Tech Support | Avira Support NumberAvira Refund.

By now, making purchases on e-commerce sites has become a habit for Americans, but without the proper precautions, there are still many risks. Christmas shopping is now in full swing. And for us Americans, our favorite store is the internet. At this point, it’s pretty much a habit to go to the actual store, check out the items you’re interested in, and then quickly search sites like Amazon to find out if there’s a better deal online.

It’s an already known fact that nowadays people are using smartphones to browse the Internet more than they use their other devices. They even do their Christmas shopping from their phones. According to a Statista Study from 2017, 62% of Americans are choosing this method because they can find the best deals and save money. At the same time, 48% of the respondents claim that the main reason for purchasing Christmas gifts directly from their smartphones is because this way, their data is secured and protected.

There’s a secure future for the sale of many categories of commodities on the internet, also thanks to concepts such as multi-channel and omnichannel, which provide a constant synergy between the business strategies of a brand both offline and online. An example? Being able to purchase a discounted printer online and pick it up in store, where there may be an offer on ink cartridges or reams of paper.

There are many choices, many possibilities, but still many risks if an adequate level of attention is not paid when making online purchases. In what sense? Hackers and cybercriminals are always lurking: they try to trick internet users into entering secret passwords in order to steal sensitive information and, when possible, gain direct access to personal accounts at credit institutions. It’s true that today, transferring money from one account to another is not that simple, thanks to solutions such as two-factor authentication; but platforms exist which, for various reasons, are intrinsically considered secure when they’re actually not. So what can we do? Here are five rules to follow in order to protect yourself when searching for gifts on the internet!

Check the security of a website

There are two ways to quickly find out if a website has a solid foundation or not. First is the presence of the suffix https. The second: that little lock before the web address, which means that the site supports SSL encryption, which comes into play when you enter codes and sensitive data; these then become encrypted and illegible to prying eyes.

Provide the least amount of information possible

Your first name, last name, and shipping address are okay, but when it comes to entering your payment details, it’s better to be cautious. The SSL rule applies, but that’s not all: there’s no reason to enter the three numbers on the back of the card if you’re not on the credit institution’s website (where an SSL is also obligatory), and it’s also best not to connect an account, especially for a temporary purchase, to social profiles such as Facebook and Twitter, which could very well be hacked by cybercriminals and used for blackmail and tampering.

Pay with prepaid cards or secure systems

Going back to payment options, a good idea is to use prepaid cards loaded with an amount slightly greater than what you have to pay online. In this way, you ensure that there’s not a hefty sum available if there’s a breach online or at an ATM, carried out through techniques known as skimming. There are also methods, such as PayPal, that are capable of protecting your purchase even after completing it, by “freezing” the amount until you receive the purchased item at home. At that point, either everything is unblocked or a justified claim is made.

Be wary of phishing!

Those hackers again… During the Christmas season, there is a steep increase in the number of fake e-mail messages received, which are created specifically to attract malicious clicks. This practice, known as mail phishing, tries to trick internet users with promotional messages and phantasmagorical discounts on the hottest items. The body of the e-mail contains web addresses that, once visited, can directly infect the computer or ask for usernames and passwords to the most popular platforms. This doesn’t entail a direct loss of money, but it does involve more serious consequences in the long term, such as private messages being read and extortion activities being carried out after your computer is blocked through malware and viruses, otherwise frightfully known as cryptolocker.

Use protection software

All of these problems can be resolved with a high-quality protection software. The latest-generation antivirus programs can perform a real-time analysis of compromised websites (those lacking certificates) and e-mail messages from senders whose domains are considered fake or suspicious. You should still continue paying careful attention, but this type of technology can lend a huge helping hand. Avira Antivirus, for example, is a great companion that is capable of intercepting malicious traffic and blocking it from the outset, thus preventing you from making an unpleasant Christmas blunder.

Source : blog.avira.com

Avira Tech Support : Blog

Avira Safe Things™ reimagines home security in the IoT world, without adding another device in the house

avira-safethings-protects-smart-home

Tags :- Avira Tech Support | Avira Support NumberAvira Refund.

With SafeThings™ we’re introducing a totally new approach to safeguard smart homes and the growing number of IoT devices. With nearly a decade of experience in artificial intelligence and machine learning, we have developed a gateway software solution for IoT devices that provides security and privacy without additional infrastructure, nor added complexity for the users.

Effective solution that just works

Avira SafeThings™ is a software application installed on routers that automatically secures the connected devices in the home, by using machine learning and artificial intelligence, in a friendly manner, with a compelling user interface. SafeThings™ is easily delivered via the router or the internet service providers and doesn’t require end users to act as the information security officers for their home.

Avira SafeThings™ transforms routers into home protectors, supporting your privacy and placing IoT devices beyond the reach of hackers. SafeThings™ sits where the home meets the internet, within the home router. By identifying what goes in and out – and then using artificial intelligence to dynamically analyze their behavior – SafeThings™ can quickly identify intrusive or hijacked IoT device activity and stop it. It safeguards your connected devices against hijacking, ransomware, misuse, and intrusion, while enabling you to see and control how your connected devices handle data.

IoT became the spying neighbor within the house

The smart home has become a reality. The Internet of Things enables convenient manageability of a variety of devices – from electronics (phones, tablets, TV), to utilities (thermostats, lighting, energy trackers) and even appliances (connected washer/vacuum cleaners). According to the industry analyst firm Gartner, the estimated total number of connected devices would hit 8.4 billion in 2017, a big jump of 31% from 2016. That count puts the number of these devices well over that of the 7.5 billion people inhabiting the Earth.

Internet of Things benefits come with a tradeoff: the owners are virtually naked and exposed in their see-through smart homes by providing nonstop, often unencrypted information for about all their private actions – choice of TV programs, CCTV videos of home activities, and even preferred thermostat settings. Fundamental principles of security are routinely ignored with IoT devices. They are often shipped with default or poorly generated default passwords, and no “change password at first use” policy.  There are extreme cases where no password is required to access devices or select services on those devices. Additionally, unnecessary ports are often left open at the factory.

It is estimated that currently 70% of the IoT devices are vulnerable to hijacking.  Attackers know these and exploit such vulnerabilities putting both the connected home and the network infrastructure at risk. The release of Mirai malware in October 2016 changed the landscape dramatically, proving that smart devices can be enslaved into a botnet to distribute spam and malware or to stole private data for blackmailing.

In real life, most people close the curtains or lock the door when they realize they are exposed. But with many connected smart homes, users don’t even realize that the spying neighbor next door lives now in their house. They might not know which of their household appliances – from light bulbs to washing machine – are tracking the online and offline behavior. Even worse, they have no way to slam the door on these intruders, apart from unplugging the device.

Building a secure platform

Avira SafeThings™ is a security platform, fusing several functions together as it secures the smart home, via four basic actions:

Watches – A software agent tags each device in the smart home and collects basic information about messages going in and out through the gateway. This info is like the sending and return address on a letter, Avira SafeThings™ is not getting into the private content.

Thinks – SafeThings™ uses AI – such as machine & swarm intelligence – techniques to dynamically classify each device, determine normal behavior, and develop the advanced logic needed set the rules for connected devices. It also learns and adapts to develop more accurate detection, by itself.

Acts – When SafeThings™ AI detects unusual device activity, it has the agent enforce the rules. This shuts down the suspect activity without disturbing the device’s usual functions.

Shares – The SafeThings™ user interface shows in a friendly manner what’s going on in the network. You get to know more about the data the smart devices are collecting and broadcasting, without requiring you to step into the process.

Device security with Avira inside

Avira is bucking the industry trend of selling an additional box for Internet of Things security. As a software solution, Avira SafeThings™ is available only through internet service providers and through router manufacturers.  Are you interested as a consumer? To get Avira SafeThings™ covering the home network and router activity, you should talk to your local service provider or look for the Avira label on your next router.

Source : blog.avira.com

Avira Tech Support : Blog

Avira System Speedup: Welcome to the beta!

avira-beta-test

Tags :- Avira Tech Support | Avira Support NumberAvira Refund.

As of now it improved the speed and performance of millions of devices all around the world. But performance and speed are not everything, as a lot of you may know. Just recently a user wrote the following in the comment section of our blog: “It’s too bad AV-Comparatives does not rate stability, or how much of a typical user’s time will be wasted with ridiculous bugs or idiotic UI design flaws. If they did, lots of the competitors that were anywhere near Avira would shrink into the background. [….]

And, to be honest, we tend to agree with the above user comment. A clear and user-friendly design is almost as important as the functionality of a program. That’s why we take it just as serious and decided to redesign the Avira System Speedup user interface – based on your, our customers, feedback.

The implemented design improvements will make it more intuitive and easier than ever for you to perform a scan and clean your device, to assess your computer and improve the Disk, Performance and Privacy scores. Also, improving the startup time of your PC is now easy as pie, thanks to the Boot-Time Optimizer.

Speedup 2.0 - Boot Optimizer EN

But enough talk, it’s time to get your hands dirty! All of those changes need to be tested thoroughly and who would be better suited to do so than you, our users?

Helping us test our Avira System Speedup is real easy. Just visit our beta center, register your account (or log in if you already have one) and you are ready to go. The best thing about it though is that you can actively participate in the development of Avira System Speedup:  We plan on releasing new updates weekly, based on the feedback of our beta testers.

 Source : blog.avira.com

Avira Tech Support : Blog

Lost your mobile device? “Yell” or catch the thief in his nest

Avira-Antivirus-Pro-2015-Free-Download

Tags :- Avira Tech Support | Avira Support NumberAvira Refund.

The new Anti-Theft feature in our Avira Online Essentials dashboard has a couple cool tricks to help you get back your lost smartphone or tablet. And, this feature is available on Android and iOS devices – and your home PC.

Here’s how it works:

The first step is simply to register your devices with Avira, activate the “Device Administrator” feature, and afterwards you can remotely control them using the Online Essentials dashboard. Soon after activation, finding your smartphone or tablet will be just a couple of clicks away.

1st scenario: You misplaced the device

Go to the “Can not find your device” section of the Online Essentials dashboard and trigger the “Play Sound” button. A really powerful signal will start sounding and if the device is nearby, you will surely find it. If it’s in somebody else’s hands, just imagine the panic on his face.

After you are sure that the device has been stolen, it’s time to go to “Lock your device” function. Add a PIN code that is known only by you and preset a message with contact details, which will be shown on the smartphone’s screen to its new “owner”.

On iOS, you have an additional contact option. While you can only send a message on an Android device, on iPhone you can directly call the person that has the device. Just go to the closest computer and access your Online Essential account.

Capture1

2nd Scenario: Your device was stolen for sure and you get no answer

Hmmm, that’s nasty! But don’t lose hope. Go to “Think you lost your device?” function, click on “Wipe” and then you can select the data that shouldn’t get into wrong hands: Delete the storage, the SIM card or you can do a factory reset directly. Of course, shortly after this, the Police must be informed about the theft. The “Device data” gives you a complete report on your smartphone and provide all the necessary information for the investigation such as IMEI number and other product details.
Capture2

Locate the device

If you want to solve the theft problem faster and more efficiently, you can always activate the “Locate” function in Online Essentials. This will show you the exact location of the missing device and also a Google Street View of the place where it can be found. But bear in mind that this works only if the location settings are enabled and if the battery is not drained or removed.

Now, that you know what Anti-Theft feature can do, you can start preparing your devices for this kind of situations. Download Avira Free Antivirus, pair one or more devices and make it into a companion that will always be there to help when you can’t find your smartphone or tablet.

Source : blog.avira.com

Avira Tech Support : Blog