Logo Ameba Icon Security Icon Security White Icon Privacy Icon Performance Icon Privacy Icon Security Icon Performance Icons/45/01 Security/Other-Threats Icons / 32 / Bloatware removal Icons / 32 / Registry Cleaner Icons / 32 / CleanUp Icons / Feature / 32 / Mac Icons / 32 / Browser cleanup Icons/32/01 Security/Malware Icons/32/01 Security/Viruses Icons/32/01 Security/Other-Threats Icons/32/01 Security/Passwords Icons/32/01 Security/Ransomware Icons/32/01 Security/Business Icons/32/02 Privacy/Browser Icons/32/02 Privacy/IP adress Icons/32/02 Privacy/VPN Icons/32/02 Privacy/Proxy Icons/32/02 Privacy/Streaming Icons/32/03 Performance/Celaning Icons/32/03 Performance/Drivers Icons/32/03 Performance/Gaming Icons/32/03 Performance/Hardware Icons/32/03 Performance/Speed Icons / 32 / Bloatware removal Icons / 32 / Registry Cleaner Win Icons / 32 / CleanUp Icons / Feature / 32 / Mac Icons / 32 / Browser cleanup Icons/60/02 Privacy/02_Privacy Icons/60/01 Security/01_Security Icons/60/03 Performance/03_Performance Icons/80/01 Security/IoT Icons/80/01 Security/Malware Icons/80/01 Security/Passwords Icons/80/01 Security/Ransomware Icons/80/01 Security/Viruses Icons/80/01 Security/Other-Threats Icons/80/03 Security/Business Icons/80/02 Privacy/Browser Icons/80/02 Privacy/IP adress Icons/80/02 Privacy/VPN Icons/80/02 Privacy/Proxy Icons/80/02 Privacy/Streaming Icons/80/03 Performance/Celaning Icons/80/03 Performance/Drivers Icons/80/03 Performance/Gaming Icons/80/03 Performance/Hardware Icons/80/03 Performance/Speed Icons/80/03 Performance/03_Performance Icons/80/02 Privacy/02_Privacy
Avast
academy
Close
  • For home For home Products for PC and mobile phone protection
  • For business For business Protect your business with Avast
  • For partners For partners Partner with Avast and boost your business
  • About us About us Carriers, investors, media, contact
  • Blogs Academy, Blog, Decoded, Forum
  • Search
  • English
  • Blogs
  • Avast Blog Read about recent news from the security world
  • Avast Academy Best point of reference about cyber attacks
  • Avast Decoded In-depth technical articles regarding security threats
  • Avast Forum Discuss with the community
  • Select region
    • English
    • Čeština
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Polski
    • Português
    • Русский
Academy
  • Security
      • Malware
      • Viruses
      • Ransomware
      • Other Threats
      • Passwords
      • Internet of Things
      • Business
    See all Security articles
  • Privacy
      • Browser
      • IP Address
      • VPN
      • Streaming
      • Proxy
    See all Privacy articles
  • Performance
      • Speed
      • Cleaning
      • Hardware
      • Drivers
      • Gaming
    See all Performance articles
Avast
academy
  • Security
    • Malware
    • Viruses
    • Ransomware
    • Other Threats
    • Passwords
    • Internet of Things
    • Business
    See all Security articles
  • Privacy
    • Browser
    • IP Address
    • VPN
    • Streaming
    • Proxy
    See all Privacy articles
  • Performance
    • Speed
    • Cleaning
    • Hardware
    • Drivers
    • Gaming
    See all Performance articles
  • English
    • English
    • Čeština
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Polski
    • Português
    • Русский
academy
  • Security
    • Malware
    • Viruses
    • Ransomware
    • Other Threats
    • Passwords
    • Internet of Things
    • Business
    View all topics
  • Privacy
    • Browser
    • IP Address
    • VPN
    • Streaming
    • Proxy
    View all topics
  • Performance
    • Speed
    • Cleaning
    • Hardware
    • Drivers
    • Gaming
    View all topics
  • English
    • English
    • Čeština
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Polski
    • Português
    • Русский
Menu
academy
Security
  • Malware
  • Viruses
  • Ransomware
  • Other Threats
  • Passwords
  • Internet of Things
  • Business
Privacy
  • Browser
  • IP Address
  • VPN
  • Streaming
  • Proxy
Performance
  • Speed
  • Cleaning
  • Hardware
  • Drivers
  • Gaming
English
Security
Security
Malware
Viruses
Ransomware
Other Threats
Passwords
Internet of Things
Business
See all Security articles
Privacy
Privacy
Browser
IP Address
VPN
Streaming
Proxy
See all Privacy articles
Performance
Performance
Speed
Cleaning
Hardware
Drivers
Gaming
See all Performance articles
Select language
Select language
English
Čeština
Deutsch
Español
Français
Italiano
日本語
Polski
Português
Русский

Avast Academy

Avast prevents 1.5 billion cyber attacks per month. And in our free time, we love teaching the world about digital security, online privacy, and device performance. See all of our guides, tips, and advice right here.

Security
  • Malware
  • Viruses
  • Ransomware
  • Other Threats
  • Passwords
  • Internet of Things
  • Business
  • See all Security articles ...
Privacy
  • Browser
  • IP Address
  • VPN
  • Streaming
  • Proxy
  • See all Privacy articles ...
Performance
  • Speed
  • Cleaning
  • Hardware
  • Drivers
  • Gaming
  • See all Performance articles ...
Security
Privacy
Performance
  • Malware
  • Viruses
  • Ransomware
  • Other Threats
  • Passwords
  • Internet of Things
  • Business
  • All Security articles...
  • Browser
  • IP Address
  • VPN
  • Streaming
  • Proxy
  • All Privacy articles...
  • Speed
  • Cleaning
  • Hardware
  • Drivers
  • Gaming
  • All Performance articles...

Tags

DESKTOP MOBILE WINDOWS MAC

Security

Malware

What_Is_Malware-Thumb
What is Malware?
How to Detect and Remove Spyware From an iPhone
More About Malware

Viruses

The Essential Guide to Computer Viruses
Stuxnet: What Is It & How Does It Work?
More About Viruses

Ransomware

The Essential Guide to Ransomware
How_to_prevent_ransomnware-Thumb
How to Prevent Ransomware
More About Ransomware

Other Threats

Is_this_website_safe-Your_complete_website_safety_check_guide-Thumb
Is This Website Safe? Your Complete Website Safety Check Guide
What Are QR Codes and How Do You Scan Them?
More About Other Threats

Passwords

How_to_Password_Protect_a_File_or_Folder_in_Windows-Thumb
Step-By-Step Guide to Password Protect a File or Folder in Windows
How Does Two-Factor Authentication (2FA) Work?
More About Passwords

Internet of Things

What_Is_the_Internet_of_Things-Thumb
What is the Internet of Things (IoT)?
Is Alexa Always Listening? How to Protect Your Privacy
More About Internet of Things

Business

What is cybersecurity?
IT Disaster Recovery Plans
More About Business
SHOW MORE SECURITY ARTICLES

Privacy

Browser

How to Clear Your Browser History
The Dark Web Browser: What Is Tor, Is it Safe, and How to Use It
More About Browser

IP Address

What is an IP Address?
How to Spot and Prevent IP Spoofing
More About IP Address

VPN

What_is_a_VPN_and_how_does_it_work-Your_Essential_Guide-Thumb
What is a VPN & How Does it Work?
WireGuard VPN Protocol: The New, Secure, and Fast VPN Protocol
More About VPN

Streaming

What is Internet Streaming and How Does it Work?
How to Watch TV Online
More About Streaming

Proxy

What is a Proxy Server and How Does it Work?
Reverse Proxy Servers Explained: What They Are & How to Use Them
More About Proxy
SHOW MORE PRIVACY ARTICLES

Performance

Speed

How_to_Speed_Up_Your_PC-Thumb
How to Speed Up Your PC
How_to_Speed_Up_a_Slow_Mac-Thumb
Mac Running Slow? Here’s How to Fix a Slow Mac
More About Speed

Cleaning

How to Start Your Mac in Safe Mode
Best Duplicate File Finders & Remover Tools for Windows
More About Cleaning

Hardware

How_to_Check_and_Monitor_Your_CPU_Temperature-Thumb
How to Check and Monitor Your CPU Temperature
How_to_Check_How_Much_RAM_You_Have-Thumb
How to Check How Much RAM You Have on Windows PC or Mac
More About Hardware

Drivers

How to Check Your Graphics Card and Drivers on Windows PC
The Best Driver Updater Software for Windows
More About Drivers

Gaming

How to Increase FPS and Optimize Your Gaming PC
How Much Screen Time Is too Much for Kids?
More About Gaming
SHOW MORE PERFORMANCE ARTICLES

Tags

DESKTOP MOBILE WINDOWS MAC

What's New on Avast Academy

Security
Privacy
Performance
  • What Are QR Codes and How Do You Scan Them?
  • What Is Cryptocurrency and How Does It Work?
  • How to Spot Fake News
  • Instagram Phishing Scams — How to Spot & Avoid Scammers
  • ATM Skimming: What Is It and How to Spot a Skimmer
  • Stuxnet: What Is It & How Does It Work?
  • What Is Cyberstalking and How to Stop It
  • How to Spot and Avoid Gift Card Scams
  • Social Engineering and How to Prevent It
  • What Exactly Is a Virtual Machine and How Do They Work?
  • WireGuard VPN Protocol: The New, Secure, and Fast VPN Protocol
  • The Dark Web Browser: What Is Tor, Is it Safe, and How to Use It
  • How to Watch TV Online
  • What Is the Best Browser for Privacy and Security?
  • How to View and Delete Incognito History
  • How to Unblock Websites at School, Home, or Work
  • How to Spot and Prevent IP Spoofing
  • How to Set Up and Control Google SafeSearch
  • How to Manage and Remove Firefox Add-ons
  • What Is Incognito Mode and Is It Safe?
  • Mac Running Slow? Here’s How to Fix a Slow Mac
  • How to Start Your Mac in Safe Mode
  • How to Check and Monitor Your CPU Temperature
  • How to Check How Much RAM You Have on Windows PC or Mac
  • How to Increase Your Internet Speed Right Now
  • Best Duplicate File Finders & Remover Tools for Windows
  • How to Check Specs on Windows PC
  • What Are Junk Files and How to Remove Them
  • How to Stress Test Your PC’s CPU
  • How to Clear Storage on iPhone: Cache, Documents, and Data

For Home

  • Support
  • Security
  • Privacy
  • Performance
  • Blog
  • Forum

For Business

  • Business support
  • Business products
  • Business partners
  • Business blog
  • Affiliates

For Partners

  • Mobile Carriers

Company

  • Contact Us
  • Investors
  • Careers
  • Press Center
  • Responsibility
  • Technology
  • Research Participation
1988-2022 Copyright Avast Software s.r.o.
  • Privacy policy
  • Legal
  • Report vulnerability
  • Contact security
  • Modern Slavery Statement
  • Do not sell my info
  • Cookie Preferences