Logo Ameba Icon Security Icon Security White Icon Privacy Icon Performance Icon Privacy Icon Security Icon Performance Icons/45/01 Security/Other-Threats Created with Sketch. Icons/32/01 Security/Malware Created with Sketch. Icons/32/01 Security/Viruses Created with Sketch. Icons/32/01 Security/Other-Threats Created with Sketch. Icons/32/01 Security/Passwords Created with Sketch. Icons/32/01 Security/Ransomware Created with Sketch. Icons/32/02 Privacy/Browser Created with Sketch. Icons/32/02 Privacy/IP adress Created with Sketch. Icons/32/02 Privacy/VPN Created with Sketch. Icons/32/02 Privacy/Proxy Created with Sketch. Icons/32/02 Privacy/Streaming Created with Sketch. Icons/32/03 Performance/Celaning Created with Sketch. Icons/32/03 Performance/Drivers Created with Sketch. Icons/32/03 Performance/Gaming Created with Sketch. Icons/32/03 Performance/Hardware Created with Sketch. Icons/32/03 Performance/Speed Created with Sketch. Icons/60/02 Privacy/02_Privacy Created with Sketch. Icons/60/01 Security/01_Security Created with Sketch. Icons/60/03 Performance/03_Performance Created with Sketch. Icons/80/01 Security/IoT Created with Sketch. Icons/80/01 Security/Malware Created with Sketch. Icons/80/01 Security/Passwords Created with Sketch. Icons/80/01 Security/Ransomware Created with Sketch. Icons/80/01 Security/Viruses Created with Sketch. Icons/80/01 Security/Other-Threats Created with Sketch. Icons/80/02 Privacy/Browser Created with Sketch. Icons/80/02 Privacy/IP adress Created with Sketch. Icons/80/02 Privacy/VPN Created with Sketch. Icons/80/02 Privacy/Proxy Created with Sketch. Icons/80/02 Privacy/Streaming Created with Sketch. Icons/80/03 Performance/Celaning Created with Sketch. Icons/80/03 Performance/Drivers Created with Sketch. Icons/80/03 Performance/Gaming Created with Sketch. Icons/80/03 Performance/Hardware Created with Sketch. Icons/80/03 Performance/Speed Created with Sketch. Icons/80/03 Performance/03_Performance Created with Sketch. Icons/80/02 Privacy/02_Privacy Created with Sketch.
Avast
academy
  • Security
    • Malware
    • Viruses
    • Ransomware
    • Other Threats
    • Passwords
    • Internet of Things
    See all Security articles
  • Privacy
    • Browser
    • IP Address
    • VPN
    • Streaming
    See all Privacy articles
  • Performance
    • Speed
    • Cleaning
    • Hardware
    • Drivers
    • Gaming
    See all Performance articles
  • English
    • English
    • Čeština
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Polski
    • Português
    • Русский
academy
  • Security
    • Malware
    • Viruses
    • Ransomware
    • Other Threats
    • Passwords
    • Internet of Things
    View all topics
  • Privacy
    • Browser
    • IP Address
    • VPN
    • Streaming
    View all topics
  • Performance
    • Speed
    • Cleaning
    • Hardware
    • Drivers
    • Gaming
    View all topics
  • English
    • English
    • Čeština
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Polski
    • Português
    • Русский
Menu
academy
Security
  • Malware
  • Viruses
  • Ransomware
  • Other Threats
  • Passwords
  • Internet of Things
Privacy
  • Browser
  • IP Address
  • VPN
  • Streaming
Performance
  • Speed
  • Cleaning
  • Hardware
  • Drivers
  • Gaming
English
Security
Malware
Viruses
Ransomware
Other Threats
Passwords
Internet of Things
See all Security topics
Privacy
Browser
IP Address
VPN
Streaming
See all Privacy topics
Performance
Speed
Cleaning
Hardware
Drivers
Gaming
See all Performance topics
Select language
English
Čeština
Deutsch
Español
Français
Italiano
日本語
Polski
Português
Русский

Security

We’ve been fighting viruses since 1988 — so we know how to keep you secure. Learn from our experts and get the skills you need to stay safe against online threats.

Malware
Viruses
Ransomware
Other Threats
Passwords
Internet of Things
Avast Academy Security

Malware

MORE ABOUT Malware
What_Is_Malware-Thumb
The Essential Guide to Malware: Detection, Prevention & Removal
Spyware-Thumb
What is Spyware? Learn How to Protect Your Personal Data
The_Essential_Guide_for_Mac_Security-Thumb
The Essential Guide for Mac Security
Adware-Thumb
Say "No Thanks" to Adware: How to Remove it from Your Device
SHOW MORE "MALWARE" ARTICLES

Viruses

MORE ABOUT Viruses
How_to_Remove_a_Virus_from_a_Mac-Thumb
How to Remove a Virus from a Mac
Can_Phones_Get_a_Virus-Thumb
Can Your iPhone or Android Phone Get a Virus?
Trojan-Thumb
Trojans: Learn How to Avoid This Sneaky Bit of Malware
Zeus_trojan-Thumb
Zeus Trojan: Everything You Need to Know to Avoid it
Computer_worm-Thumb
All About Computer Worms: How They Work & How to Stop Them
Computer_Virus-Thumb
The Essential Guide to Computer Viruses: Protect Your Machine
SHOW MORE "VIRUSES" ARTICLES

Ransomware

MORE ABOUT Ransomware
How_to_Remove_Ransomware_from_a_Mac-Thumb
How to Remove Ransomware from a Mac
How_to_remove_ransomware_from_PC-Thumb
How to Remove Ransomware from Windows 10, 8 or 7
What_is_Ransomware-Thumb
The Essential Guide to Ransomware and How to Protect Yourself
CryptoLocker-Thumb
CryptoLocker Ransomware: What You Need to Know
Locky_ransomware-Thumb
What is Locky Ransomware?
Cerber_ransomware-Thumb
Cerber Ransomware: Detect it, Remove it, Prevent it
SHOW MORE "RANSOMWARE" ARTICLES

Other Threats

MORE ABOUT Other Threats
Is_this_website_safe-Your_complete_website_safety_check_guide-Thumb
Is This Website Safe? Your Complete Website Safety Check Guide
Protect_yourself_from_cryptojacking-Thumb
Protect Yourself from Cryptojacking
Fake_apps-How_to_spot_a_imposters_before_its_too_late-Thumb
Fake Apps: How to Spot Imposter Before it's Too Late
SQL_injection-Thumb
SQL Injection: How it Works & How to Protect Yourself
Spoofing-Thumb
What is Spoofing? How to Recognize and Avoid it
Exploits-Thumb
Protect Yourself Against Exploits to Keep Hackers Out
SHOW MORE "OTHER THREATS" ARTICLES

Passwords

MORE ABOUT Passwords
How_to_Password_Protect_a_File_or_Folder_in_Windows-Thumb
Step-By-Step Guide to Password Protect a File or Folder in Windows
How_to_Recover_or_Reset_Forgotten_Windows_Passwords-Thumb
How to Recover or Reset Forgotten Windows Passwords
How_to_choose_the_best_password_manager-Thumb
How to Choose the Best Password Manager
SHOW MORE "PASSWORDS" ARTICLES

Internet of Things

MORE ABOUT Internet of Things
What_Is_the_Internet_of_Things-Thumb
What is the Internet of Things (IoT)?
Internet_of_Things_Security_Risks-Thumb
Internet of Things Security Risks
What_is_a_smart_home-Thumb
What is a Smart Home?
How_to_Make_Your_Home_a_Smart_Home-Thmub
How to Build a Smart Home: A Beginner’s Guide
SHOW MORE "IoT" ARTICLES

Tags

MOBILE DESKTOP MAC WINDOWS iOS ANDROID SOCIAL MEDIA EMAIL

What's New on Avast Academy

Privacy
Performance
  • What is an IP Address?
  • What is Internet Streaming and How Does it Work?
  • VPN, Proxy or Tor: Which is Best?
  • How to Find Your IP Address on Windows or Mac
  • How to Watch TV Online
  • How to Clear Your Browser Cookies
  • How to Enable or Disable Cookies in Chrome, IE, Firefox, Edge, and Safari
  • How Do I Remove MySearchDial Toolbar?
  • Static vs. Dynamic IP Addresses
  • How Do I Remove Conduit Toolbar?
  • How to Format a Hard Drive: The Essential Guide
  • The Essential Guide: How to Clean Up Your Computer
  • How to Speed Up Your PC
  • How to Speed Up a Slow Mac
  • How to Clone a Hard Drive
  • How to Defrag Windows 10, Windows 8 and Windows 7 Hard Drives
  • How to Check How Much RAM You Have
  • What is RAM and Why is it Important?
  • How to Check and Monitor Your CPU Temperature
  • How to Update Your Device Drivers for Windows

Free Security Tools

  • Free Ransomware Protection
  • Free Rootkit Scanner & Remover
  • Free Trojan Scanner & Remover
  • Free Adware Scanner & Cleaner
  • Free Malware Scanner & Remover
  • Free Virus Scanner & Remover
  • Free Spyware Scanner & Remover

United States (English)

Useful links

  • Support
  • Business Support
  • Forum
  • Affiliates
  • Security news
  • Paid Online Interview

The company

  • Contact us
  • Investors
  • Careers
  • Press center
  • Technology
  • Responsibility
  • Avast Foundation
  • Avast Blog
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube

Privacy policy Legal

1988-2019 Copyright Avast Software s.r.o.

We use cookies and similar technologies to recognize your repeat visits and preferences, to measure the effectiveness of campaigns, and improve our websites. For settings and more information about cookies, view our Cookie Policy. By clicking “I accept” on this banner or using our site, you consent to the use of cookies.

I ACCEPT