
Avast Makes AI-Driven Scam Defense Available For Free Worldwide
Cybercriminals continue to abuse AI to craft increasingly convincing scam attacks at an alarming rate. Available at no cost, the new service marks a significant step forward in democratising AI scam protection. A premium version, Avast Scam Guardian Pro, has also been added to Avast Premium Security, giving customers an enhanced layer of AI protection against email scams.
'Today's scams aren't crude or obvious – they're tailored, targeted, and AI-enhanced, making it harder than ever to tell the difference between truth and deception,' said Leena Elias, Chief Product Officer at Gen. 'As scammers take advantage of rising data breaches and leaked personal information, anyone anywhere can become a victim of scams. That's why it's never been more important to make powerful AI-powered scam protection available to everyone, everywhere. We're levelling the playing field with world class scam defense that helps people strengthen their digital and financial safety.'
According to the recent Q1/2025 Gen Threat Report, breached records of individuals surged by more than 186% between January and March 2025, revealing sensitive information such as passwords, emails, and credit card details. Over the same timeframe, reports of phishing scams rose by 466% compared to the previous quarter, making up almost a third of all scam submissions observed by Gen.
As data breaches rise, so do the opportunities for attackers to exploit leaked information to launch targeted, hyper-personalised scam campaigns that are harder than ever to spot. Like a seasoned scam investigator, Avast Scam Guardian uses proprietary AI trained on scam data from Gen Threat Labs to go beyond just detecting malicious URLs – it also analyses context and language to more effectively identify signs of deceptive or harmful intent. Avast Scam Guardian also helps to pull back the curtain on hidden threats in website code and neutralises them to keep people safer as they browse and shop online.
Key features available in Avast Scam Guardian for Avast Free Antivirus, include:
Avast Assistant: Provides 24/7 AI-powered scam protection guidance on suspicious websites, SMS messages, emails, links, offers, and more. Allows people to engage in open dialogue when they're unsure about a potential scam and uses natural language to better understand queries and deliver clear advice on what to do next. Available on Windows and Mac.
Web Guard: Uses the collective power of Gen Threat Labs telemetry and AI trained on millions of frequently visited websites to continuously analyse and detect hidden scams in content and code** – offering unique visibility into dangerous URLs. Available on Windows, Mac, Android, and iOS**.
Avast Scam Guardian Pro includes everything in Avast Scam Guardian, plus:
Email Guard: Uses AI to understand the context of emails and the meaning of words to detect scams. Scans and flags safe and suspicious emails before you open them, helping to protect your email wherever you check it, no matter what device you use to log in. Available on Windows, Mac, Android, and iOS***.
Avast Scam Guardian and Scam Guardian Pro are available to download now as part of Avast Free Antivirus and Avast Premium Security. Later this year, additional AI-powered tools will be added to Avast Scam Guardian Pro for greater protection against sophisticated scams targeting other communication channels, including SMS and phone calls.
For more information, please visit www.avast.com.
*AV-Comparatives, 'Top-Rated Product 2024 Award' & AV-Comparatives, 'Real-World Protection 2024 Award' - Jan-Dec 2024.
**Content and code scanning is only available on Windows and Mac.
**Email Guard is included, but mobile platforms do not have the Scam Guardian user interface.
About Avast
Avast is a leader in digital security and privacy, and part of Gen (NASDAQ: GEN), a global company dedicated to powering Digital Freedom with a family of trusted consumer brands. Avast protects hundreds of millions of users from online threats, for Mobile, PC or Mac, and is top-ranked and certified by VB100, AV-Comparatives, AV-Test, SE Labs and others. Avast is a member of the Coalition Against Stalkerware, No More Ransom and Internet Watch Foundation. Learn more at Avast.com.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Techday NZ
6 days ago
- Techday NZ
August Patch Tuesday: Microsoft addressing 111 vulnerabilities
Microsoft is addressing 111 vulnerabilities this August 2025 Patch Tuesday, a volume which is around the recent average. In a neat parallel with last month, Microsoft is aware of public disclosure for a single one of the vulnerabilities published today, and claims no evidence of in-the-wild exploitation. Once again, the lone Patch Tuesday zero-day vulnerability is assessed as only moderate severity at time of publication, which brings Microsoft's lucky streak up to 11 months. Today's release includes the publication of nine critical remote code execution (RCE) vulnerabilities, although Microsoft has only marked one of these as more likely to see exploitation. Eight browser vulnerabilities have already been published separately this month, and are not included in the total. What do attackers want in a Windows context? Domain admin! When do they want it? Now! Today's lone zero-day vulnerability might be just what they need to break through the final layers of protection and swipe the crown jewels. CVE-2025-53779 is an elevation of privilege (EoP) vulnerability in the Windows implementation of Kerberos, which is enabled via abuse of dMSA configuration. The advisory FAQ provides more clues as to the nature of the attack than many comparable Microsoft advisories, but misses a golden opportunity for clarity, since it never sets out what it means by dMSA, leaving us scouring for contextual clues. Ultimately, we can determine from context that today's hot topic is the Delegated Managed Service Account, rather than the Defender Microservices Architecture or some other piece of Microsoft paraphernalia with matching initials. Microsoft's motivation is unimpeachable: the dMSA supports automated rotation of credentials for service accounts, and is specifically designed to prevent credential harvesting using Kerberoasting. Indeed, CISA has described Kerberoasting as one of the most time-efficient ways to elevate privileges and move laterally throughout an organisation's network. The good news here is that successful exploitation of CVE-2025-53779 requires an attacker to have pre-existing control of two attributes of the hopefully well protected dMSA: msds-groupMSAMembership, which determines which users may use credentials for the managed service account, and msds-ManagedAccountPrecededByLink, which contains a list of users on whose behalf the dMSA can act. However, abuse of CVE-2025-53779 is certainly plausible as the final link of a multi-exploit chain which stretches from no access to total pwnage. Finally, it's important to note that Microsoft is only publishing patches for Windows Server 2025, and that's because msds-ManagedAccountPrecededByLink was first implemented in Server 2025. Migrating to newer operating systems sooner rather than later remains good advice, but so is remediation of zero-day vulnerabilities which could give an attacker total control of your estate. The publication of any pre-authentication RCE in Windows will naturally spark discussion. Of course, not all pre-auth RCEs are created equal, and while CVE-2025-50165 has a hefty CVSSv3 base score of 9.8, and is certainly a cause for concern, it is not the worst of the worst, since it presumably isn't wormable. Despite that, a degree of alarm is amply justified, since the advisory FAQ mentions - twice! - that user interaction isn't required. Exploitation is via a malicious JPEG file, which could be delivered within an Office document or other means; perhaps even visiting a website would be sufficient, or receiving an email within Outlook, although the advisory doesn't explicitly confirm or deny these other possible attack routes. The malformed JPEG tricks the Windows Graphics Component into code execution via an untrusted pointer dereference. The context of execution isn't specified, so in the standard spirit of caution, we'll assume SYSTEM. This is hardly a new class of problem: we can cast our minds back a dozen years, for instance, and consider the broadly similar MS13-096. However, the specific flaw underlying CVE-2025-50165 is presumably a recent introduction, since only Windows 11 24H2 and Server 2025 receive patches. Patch this one sooner rather than later, since it could provide a skilled attacker with a valuable foothold from which to launch further attacks, including perhaps even today's CVE-2025-53779. The Windows GDI+ (Graphics Device Interface Plus) is at the centre of how almost all two-dimensional graphics are rendered on Windows assets. CVE-2025-53766 is a critical RCE in how GDI+ interprets metafiles, which are often used to store vector graphics. An attacker can achieve code execution via buffer overflow without privileges or user interaction. As with today's CVE-2025-50165, it's unlikely that this vulnerability could be wormable, but the most alarming path to exploitation involved simply uploading a malicious metafile to a Windows machine running unspecified web services. There is no mention of SharePoint, Exchange, Office, or other non-Windows products in the Security Updates section of the advisory, but that still leaves an essentially limitless potential attack surface; for example, anyone running a custom application offering file uploads could find themselves vulnerable to an attacker wielding a dodgy WMF file. On the bright side, the Preview Pane is not a vector in this case. A patch is available for Server 2008, but not Server 2012, a curious and possibly concerning pattern that we see from time to time with RCEs which affect the full historic range of Windows products. Today is certainly a good day for fans of critical RCE vulnerabilities which target weaknesses in how Windows interprets graphics. Exploitation of CVE-2025-50176, a flaw in the DirectX graphics kernel, could lead to execution in a kernel context. Microsoft considers exploitation more likely, which may be why the advisory doesn't provide a great deal of information about the means of exploitation, beyond a terse statement that type confusion is involved. Type confusion is where the kernel receives a pointer which it expects to be for one type of object, but is in fact for another, which is a bit like asking someone to read out loud from a restaurant menu, but then handing them their secret diary and hoping they won't notice the difference. Most people will not be fooled, but under the right circumstances, anything is possible. There are no significant changes to Microsoft product lifecycles this month. However, October will bring a flurry of changes, including the categorical end of support for non-LTSC versions of Windows 10.


Techday NZ
06-08-2025
- Techday NZ
Master of the trade tools: The case for becoming a power user
Just like builders are great with a hammer, and painters are great with a brush, we should be GREAT with the tools we use at work. Expert "power" users of tools are often more productive, perform better and have greater job satisfaction. Yet so many of us settle for being mediocre users of the systems we depend on every single day. If you want to be even more awesome than you already are, why not focus on mastering your trade tools? I'm talking about your laptop, mobile phone and software systems at your workplace. The difference between an average user and a power user isn't just marginal – it's transformational. The rise of new AI power tools just reinforces the strong benefits of becoming a power user. The path to power user status How do you develop your skills to become a super user and master these trade tools? The journey starts with mindset and motivation. Set a goal to be GREAT with the tools you need to use in your day-to-day work life. With a growth mindset, embrace experimentation and stay in that magic learning zone for part of your working week. Remember, every expert was once a beginner who refused to give up. Start with the fundamentals. Your laptop and mobile phone are your primary workhorses. Learn the operating system properly – whether it's Windows or MacOS for 99% of us. Master those handy keyboard shortcuts and mouse gestures that can shave seconds off every task. Those seconds add up to hours, which add up to days over the course of a year and even more over your career. Here's something that might sound basic but is absolutely crucial: get your typing speed match-fit. This single skill will pay dividends in time savings for the rest of your career. You'll be faster at getting stuff done, period. In our digital-first world, your typing speed is like your running speed in athletics – it's foundational to everything else you do. For each software product you rely on, whether it's Microsoft 365 or any other platform, a similar learning approach applies. Try things, learn the shortcuts, click on buttons and see what happens. Read the tool tips and help articles – they're there for a reason. Complete online learning courses when they're available. Don't be shy about asking your software vendor for suggestions – they want you to succeed with their product. YouTube videos can be incredibly helpful, though you'll need to sift through to find the quality content. And never underestimate the power of tapping your colleague on the shoulder and asking, "Hey, how do you do this?" Sometimes the person sitting next to you knows a trick that could save you hours every week. As your new superpowers develop, something interesting happens. You become the expert that workmates come to for help. You become more productive and efficient with your time. You know the fastest way to get things done. You know when to use a hammer and when to use a jackhammer, and you're an expert at both. The insurance broker's essential toolkit For those in the insurance broking world, what are the most important trade tools you need to master? In my experience, there are four critical systems that form the backbone of successful insurance broking: First, the Policy Management System (PMS) – what I like to call the "policy operating system." This is your primary system of record for the full lifecycle of policies and claims. It's where the magic happens, where relationships are managed, and where your business lives and breathes. Second, a Document Management System (DMS) for workflow management and maintaining read-only, audited records of documents and client interactions. In our compliance-heavy industry, this isn't just helpful – it's essential. Third, Microsoft 365 – email, documents, presentations, spreadsheets and online meetings. These are the communication and collaboration tools that keep your business moving and your clients informed. Fourth, your devices – laptop and mobile phone. These are your windows into all the other systems, and mastering them amplifies everything else you do. JAVLN offers both the PMS and DMS solutions. Together, they form a powerful, cloud-based broker operating system that does many things, and we're investing to make it even better. We've also built important integrations with Microsoft 365 because we understand that your tools shouldn't work in isolation. This isn't just another technology pitch – it's about reimagining how brokerages operate. Our research found that 70% of brokers spend over three hours a day on admin tasks. That's not productive, and it's not what your clients are paying for. They want your expertise and advice, not your data entry skills. What makes our product vision different is how these tools integrate into a cohesive whole, where data flows seamlessly between platforms, eliminating redundancy, duplication and creating a single source of truth. When your systems talk to each other properly, you can focus on what you do best: advising clients and building relationships. We want to help our end users develop their broker superpowers, using JAVLN's software in combination with your other trade tools to give you a genuine boost in performance and productivity. This is the journey we're on together. We practice what we preach at JAVLN At JAVLN, we're living proof of the power user philosophy. Being a software company with staff spread around the world, our main trade tools are all cloud-based and integrated: Google Workspace for email, documents, presentations, spreadsheets and online meetings; Google Gemini for AI capabilities; Slack for team communication; Atlassian tools including JIRA and Confluence for project management and knowledge sharing; and of course, our laptops as the gateway to everything else. Our trade tools are in the cloud, web-based, well integrated and secure with multi-factor authentication. We don't have servers in our office and we don't rely on VPNs or virtual desktop solutions. All these tools have handy companion apps on mobile phones too, meaning our team can be productive from anywhere. The result? By helping our teams adopt these tools as power users and use them to their full potential, we operate as a more productive business. We're more efficient with our time, we collaborate better as teams, and we can focus on delivering maximum value to our customers. We want our JAVLN customers to benefit from a similar setup, with trade tools purpose-built for brokers and all the jobs that need to be done in your daily workflow. The AI revolution: Your new power tools Where do AI tools fit into this picture? The recent rise of AI tools has been absolutely game-changing for those who have adopted them properly. The most popular for everyday use are Microsoft's Copilot, OpenAI's ChatGPT and Google's Gemini, but new tools are emerging constantly. Sticking with our analogy, AI represents a completely new category of power tool. If you already have a toolbox with standard power tools, AI tools are like adding a jackhammer or even a bulldozer to your arsenal. When used to its full potential, they provide enormous step changes in speed and quality, giving us genuinely superhuman capabilities when used properly. With great power comes great responsibility. That's why having a safe use policy in place is crucial – proper AI governance isn't optional in today's business environment. At JAVLN, we're driving forward with developing our employees to be "AI natives." We strongly encourage adoption of AI tools specific to each role and provide bite-sized training to build competency. We want our employees to master these AI trade tools using a similar approach to learning any software system: experiment and try things, learn the shortcuts, read the documentation, complete training courses, ask vendors for guidance, watch quality YouTube content, and collaborate with colleagues. The learning approach remains the same, but the potential impact is exponentially greater. The future belongs to the masters Over the coming next few years or less, it would be fantastic to see our JAVLN customers become "AI natives" as well, and masters of their trade tools. It's a superhuman boost that can make insurance brokers be better advisors. The professionals who master these tools will have a clear advantage – they'll analyse risks faster, generate proposals quicker, and provide clients with insights that used to take days to compile. This isn't futuristic thinking – these capabilities are available right now for those willing to learn. Your trade tools are waiting. The only question is: are you ready to master them?


Scoop
05-08-2025
- Scoop
Norton Adds Audio And Visual Deepfake Protection On Mobile
Norton, a leader in Cyber Safety and part of Gen (NASDAQ: GEN), has launched AI-powered deepfake protection in the Norton Genie AI Assistant on Norton 360 mobile apps. Currently in early access phase, Norton Deepfake Protection enables people to defend themselves from malicious AI-generated audio and video content. Initially available on select Microsoft Copilot+ PCs, people can now protect themselves not only from everyday scams, but also AI scams even if they don't have an AI PC. Norton Deepfake Protection in the Genie AI Assistant includes the ability to analyse audio and visual content for signs of manipulation. Beyond detecting AI-generated voices used in fraudulent schemes, the feature provides an added layer of contextual protection by spotting inconsistencies or faint deformations in the physical features of people appearing in videos. If a harmful deepfake is detected, the Genie AI Assistant will provide conversational Cyber Safety guidance and suggestions on what to do next. 'As AI-generated voices and faces become harder to distinguish from the real thing, trust is rapidly becoming one of the most fragile elements of our digital lives,' said Leena Elias, Chief Product Officer at Gen. 'The line between truth and deception is blurring, especially when malicious actors can abuse AI to create scams that replicate voices and imagery with startling realism. This is why we've made our deepfake protection accessible to people who don't have AI hardware, so they can confidently navigate and consume digital content without second-guessing what they see or hear.' Currently, Norton Deepfake Protection in Genie Scam Protection supports English-language YouTube videos with plans to expand platform and language support in future updates. To check for signs of scams in video content, people can upload YouTube links to Norton Genie AI Assistant and receive real-time guidance on the authenticity of a video. If malicious AI-generated content is found, the Genie AI Assistant will flag it and provide advice on what to do next. The early access version of Norton Deepfake Protection is currently available in Norton 360 mobile products in the US, UK, Australia, and New Zealand, across Android and iOS devices with desktop support coming soon. The focus at Norton on AI-powered scam protection won't stop here. Later in the year, deepfake protection for AI PCs will extend to devices powered by Intel chipsets, and more advanced detection capabilities will be available on both desktop and mobile platforms. For more information, visit