13 Facts About Avira

1.

Avira was founded in 2006, but the antivirus application has been under active development since 1986, through its predecessor company H+BEDV Datentechnik GmbH.

FactSnippet No. 1,645,599
2.

Avira periodically "cleans out" its virus definition files, replacing specific signatures with generic ones for a general increase in performance and scanning speed.

FactSnippet No. 1,645,600
3.

Avira responded by reducing the size of the individual update files, delivering less data in each update.

FactSnippet No. 1,645,601
4.

Avira products contain heuristics that proactively uncover unknown malware, before a special virus signature to combat the damaging element has been created and before a virus guard update has been sent.

FactSnippet No. 1,645,602
5.

Avira removed their own firewall technology from 2014 onwards, with protection supplied instead by Windows Firewall, because Windows 8, and later the Microsoft Certification Program, forces developers to use interfaces introduced in Windows Vista.

FactSnippet No. 1,645,603
6.

Avira offers its antivirus engine in the form of a software development kit to implement in complementary products.

FactSnippet No. 1,645,604
7.

Strategic and technology partners of Avira include Canonical, CYAN Networks, IBM, intelligence AG, Microsoft, novell, OPSWAT, Synergy Systems and others.

FactSnippet No. 1,645,605
8.

On 4 September 2014, Avira announced a partnership with Dropbox, to combine Avira's security with Dropbox's "sync and share" capabilities.

FactSnippet No. 1,645,606
9.

Avira offers the following security products and tools for Microsoft Windows:.

FactSnippet No. 1,645,607
10.

Avira offers the following security applications for mobile devices running Android and iOS:.

FactSnippet No. 1,645,608
11.

Avira formerly offered free antivirus software for Unix and Linux.

FactSnippet No. 1,645,609
12.

In 2005, Avira was hit by ACE archive buffer overflow vulnerability.

FactSnippet No. 1,645,610
13.

In 2013, Avira engines were hit by a 0-day vulnerability that allowed attackers to get access to a customer's PC.

FactSnippet No. 1,645,611