AVG to acquire DroidSecurity

Posted by   Virus Bulletin on   Nov 10, 2010

Security firm set to expand solutions to mobile devices.

Czech security firm AVG has announced the acquisition of Tel Aviv-based DroidSecurity, a specialist in cloud-based protection of smartphones, tablets and other devices running on Google's Android operating system.

DroidSecurity's mobile security app, antivirus free, consistently ranks in the top 50 most popular apps for the Android platform and last month saw its 4.5-millionth download.

On completion of the acquisition, DroidSecurity will become a wholly owned subsidiary of AVG, continuing to operate from Israel. The company's CEO and co-founder, Eran Pfeffer, will become the general manager of AVG's Mobile Solutions Team.

The first known trojan affecting smartphones running the Android operating system was observed in the wild in August 2010, and with smartphone devices and applications for the platform proliferating at pace, Android is likely to see many more attacks in future.

The December issue of Virus Bulletin will include an analysis of the first Android trojan. The issue will be available to subscribers from early December. Subscription details can be found here.

Posted on 10 November 2010 by Virus Bulletin



Latest posts:

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.

VB2021 localhost call for last-minute papers

The call for last-minute papers for VB2021 localhost is now open. Submit before 20 August to have your paper considered for one of the slots reserved for 'hot' research!

New article: Run your malicious VBA macros anywhere!

Kurt Natvig explains how he recompiled malicious VBA macro code to valid harmless Python 3.x code.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.