Avast caught selling browsing data

Martin Shelton

Principal Researcher

A dumpster on fire with a pink background
Electronic Frontier Foundation (CC BY 4.0)

It’s the Digital Security Training team at Freedom of the Press Foundation (FPF), with security news that keeps you, your sources, and your devices safe. If someone has shared this newsletter with you, please subscribe here.

In the news

Aye hearties, gangway — the Avast cor-pirates are walking the plank.

That’s because the company sold user data without consumers’ knowledge, according to the Federal Trade Commission, which ordered U.K.-based Avast Limited to pay $16.5 million and will also bar the antivirus company from selling or licensing browser data for advertisements. 

Using browser extensions and its antivirus software, Avast’s subsidiary, Jumpshot, allegedly gathered “more than eight petabytes of browsing information dating back to 2014.” This potentially sensitive data included location, health information, financial status, and more. 

According to BleepingComputer, a spokesperson says “the company has already reached a settlement with the FTC to resolve the investigation regarding the data shared with the Jumpshot subsidiary that was shut down in January 2020.” Read more.

What you can do

  • The most important practice — the digital equivalent of washing your hands — is just staying on top of your security updates to patch potential vulnerabilities in your apps and operating system. Every time you download your updates, you make an attacker’s life that much harder. Read another excellent guide from my colleague David Huerta about the story behind your software updates.
  • While antivirus software is not necessarily a bad thing, depending on what tools you are downloading, you could be giving it a wide-ranging level of permission, so you really want to be certain that you need it before installing it. If you have a Mac or PC, you already have built-in antivirus software that works quite well. On Windows, you can run a manual scan with the Windows Security "virus & threat protection” feature. On Mac, these protections largely operate behind the scenes. Read David’s blog post, which answers the question, “What about antivirus?
  • If you find yourself in a situation where you keep noticing unexpected behavior (i.e., unprompted ads, which could be a sign of malware), try out the free version of Malwarebytes for a quick scan. While there are no guarantees with this sort of thing, it will look for a lot of classic signs of less-sophisticated malware. If you feel uncomfortable with it, remove it from your computer after you’re done scanning. And if you want a second opinion from an experienced acquaintance, know that because you journalists are such special people, you attract some advanced attention that might not yet be detected by classic anti-malware tools.
  • Note that spyware might not show obvious signs you’re being spied on by an unwanted third party. After all, you can’t really spy very well if you reveal yourself. But at the end of the day, spyware is just one kind of especially awful malware. So, again, installing updates is the best thing you can do to minimize risk.

Updates from my team

We are always ready to assist journalists with digital security concerns. Reach out here, and stay safe and secure out there. Yo-ho-ho!

Best,

Martin

Donate to support press freedom

Your support is more important than ever.

Read more about Digital Security Digest

Crossfire over messaging security

Johns Hopkins cryptography professor Matthew Green explains that “the cryptography behind Signal (also used in WhatsApp and several other messengers) is open source and has been intensively reviewed by cryptographers. When it comes to cryptography, this is pretty much the gold standard.” By comparison, Telegram does not provide end-to-end encryption protection by default and only offers it as an option in one-on-one “Secret Chat” mode.

Google Docs locks out writer

While it’s powerful and convenient, Google Docs might not be right for all documents, including those that you consider sensitive, private, or that you can’t risk losing. Read more about newsroom privacy and security considerations when using Google Workspace.

Google details app violations

According to its security blog, Google prevented 2.28 million — yes, million — Android apps from being published on its Play Store in 2023. The company says it also removed 333,000 accounts for attempting to deliver malware through the Play Store, as well as for “repeated severe policy violations.” These numbers have grown substantially since 2022, when the company disclosed it prevented 1.43 million apps from being published on the Play Store.