How to turn on AvastDNS on your device
It’s really quick and easy to set up AvastDNS on the most popular operating systems and web browsers. Read our simple guides, below:
Why you need protection against DNS attacks
In today’s connected world it’s vital to protect yourself against online criminals who use man-in-the-middle attacks to redirect you to fake or malicious websites and disrupt web-connected services like your browser or email. AvastDNS service adds another layer of protection between you and the internet using the HTTPS protocol to encrypt the data between the DoH client and the DoH-based DNS resolver. It also blacklists malicious websites and content, allowing you to connect securely every single time.
In a man-in-the-middle attack, a hacker uses IP spoofing to intercept communications. During an IP spoofing attack, hackers alter their IP address to trick your device into thinking they are legitimate. Using this IP spoofing method, man-in-the-middle attackers can intercept communication between two devices in order to quietly alter or steal IP packets. Your device may also freely give sensitive data to man-in-the-middle hackers, which they can use or sell on dark web marketplaces.
Protect your connection without slowing down your internet
Avast VPN gateways, using DNS over HTTPS, underpin our DNS-as-a-service offering.
DNS over HTTPS (DoH)
600+ individual hosts
You may still be wondering...
Why Use AvastDNS?
AvastDNS can protect you against common DNS-based attacks, including phishing, man-in-the-middle attacks, and domain redirections. These attacks commonly attempt to capture the login information for your accounts at financial institutions so that hackers can steal your money. AvastDNS can flag these attempts and alert you so that you can avoid these attacks.
What are the privacy guarantees for AvastDNS users?
How has AvastDNS mitigated service outages?
Does AvastDNS offer a Service Level Agreement (SLA)?
AvastDNS’s SLA promises that we will protect your web browsers against attacks like phishing attempts, man-in-the-middle attacks, DNS cache spoofing, and domain misdirections that capture your critical login information.