Logo Ameba Icon Security Icon Security White Icon Privacy Icon Performance Icon Privacy Icon Security Icon Performance Icons/45/01 Security/Other-Threats Icons / 32 / Bloatware removal Icons / 32 / Registry Cleaner Icons / 32 / CleanUp Icons / Feature / 32 / Mac Icons / 32 / Browser cleanup Icons/32/01 Security/Malware Icons/32/01 Security/Viruses Icons/32/01 Security/Other-Threats Icons/32/01 Security/Passwords Icons/32/01 Security/Ransomware Icons/32/01 Security/Business Icons/32/02 Privacy/Browser Icons/32/02 Privacy/IP adress Icons/32/02 Privacy/VPN Icons/32/02 Privacy/Proxy Icons/32/02 Privacy/Streaming Icons/32/03 Performance/Celaning Icons/32/03 Performance/Drivers Icons/32/03 Performance/Gaming Icons/32/03 Performance/Hardware Icons/32/03 Performance/Speed Icons / 32 / Bloatware removal Icons / 32 / Registry Cleaner Win Icons / 32 / CleanUp Icons / Feature / 32 / Mac Icons / 32 / Browser cleanup Icons/60/02 Privacy/02_Privacy Icons/60/01 Security/01_Security Icons/60/03 Performance/03_Performance Icons/80/01 Security/IoT Icons/80/01 Security/Malware Icons/80/01 Security/Passwords Icons/80/01 Security/Ransomware Icons/80/01 Security/Viruses Icons/80/01 Security/Other-Threats Icons/80/03 Security/Business Icons/80/02 Privacy/Browser Icons/80/02 Privacy/IP adress Icons/80/02 Privacy/VPN Icons/80/02 Privacy/Proxy Icons/80/02 Privacy/Streaming Icons/80/03 Performance/Celaning Icons/80/03 Performance/Drivers Icons/80/03 Performance/Gaming Icons/80/03 Performance/Hardware Icons/80/03 Performance/Speed Icons/80/03 Performance/03_Performance Icons/80/02 Privacy/02_Privacy
Avast
academy
Close
  • For home For home Products for PC and mobile phone protection
  • For business For business Protect your business with Avast
  • For partners For partners Partner with Avast and boost your business
  • About us About us Carriers, investors, media, contact
  • Blogs Academy, Blog, Decoded, Forum
  • Search
  • English
  • Blogs
  • Avast Blog Read about recent news from the security world
  • Avast Academy Best point of reference about cyber attacks
  • Avast Decoded In-depth technical articles regarding security threats
  • Avast Forum Discuss with the community
  • Select region
    • English
    • Čeština
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Polski
    • Português
    • Русский
Academy
  • Security
      • Malware
      • Viruses
      • Ransomware
      • Other Threats
      • Passwords
      • Internet of Things
      • Business
    See all Security articles
  • Privacy
      • Browser
      • IP Address
      • VPN
      • Streaming
      • Proxy
    See all Privacy articles
  • Performance
      • Speed
      • Cleaning
      • Hardware
      • Drivers
      • Gaming
    See all Performance articles
Avast
academy
  • Security
    • Malware
    • Viruses
    • Ransomware
    • Other Threats
    • Passwords
    • Internet of Things
    • Business
    See all Security articles
  • Privacy
    • Browser
    • IP Address
    • VPN
    • Streaming
    • Proxy
    See all Privacy articles
  • Performance
    • Speed
    • Cleaning
    • Hardware
    • Drivers
    • Gaming
    See all Performance articles
  • English
    • English
    • Čeština
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Polski
    • Português
    • Русский
academy
  • Security
    • Malware
    • Viruses
    • Ransomware
    • Other Threats
    • Passwords
    • Internet of Things
    • Business
    View all topics
  • Privacy
    • Browser
    • IP Address
    • VPN
    • Streaming
    • Proxy
    View all topics
  • Performance
    • Speed
    • Cleaning
    • Hardware
    • Drivers
    • Gaming
    View all topics
  • English
    • English
    • Čeština
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Polski
    • Português
    • Русский
Menu
academy
Security
  • Malware
  • Viruses
  • Ransomware
  • Other Threats
  • Passwords
  • Internet of Things
  • Business
Privacy
  • Browser
  • IP Address
  • VPN
  • Streaming
  • Proxy
Performance
  • Speed
  • Cleaning
  • Hardware
  • Drivers
  • Gaming
English
Security
Security
Malware
Viruses
Ransomware
Other Threats
Passwords
Internet of Things
Business
See all Security articles
Privacy
Privacy
Browser
IP Address
VPN
Streaming
Proxy
See all Privacy articles
Performance
Performance
Speed
Cleaning
Hardware
Drivers
Gaming
See all Performance articles
Select language
Select language
English
Čeština
Deutsch
Español
Français
Italiano
日本語
Polski
Português
Русский

Security

We’ve been fighting viruses since 1988 — so we know how to keep you secure. Learn from our experts and get the skills you need to stay safe against online threats.

Malware
Viruses
Ransomware
Other Threats
Passwords
Internet of Things
Business
Avast Academy Security

Malware

More About Malware
What_Is_Malware-Thumb
What is Malware?
How to Detect and Remove Spyware From an iPhone
Zeus_trojan-Thumb
The Zeus Trojan: What it is, How it Works, and How to Stay Safe
How to Detect and Remove a Keylogger
How to Remove Spigot From Your Mac
Rootkit-Thumb
What Is a Rootkit and How to Remove It?
What Is Malvertising and How Do I Stop it?
What Is a Logic Bomb? How to Prevent Logic Bomb Attacks
SHOW MORE "MALWARE" ARTICLES

Viruses

More About Viruses
The Essential Guide to Computer Viruses
Stuxnet: What Is It & How Does It Work?
How to Remove a Virus From an iPhone and iPad
The Best Free Antivirus Software in 2022
How to Remove a Virus From Your Router
Trojan-Thumb
What Is Trojan Malware? The Ultimate Guide
SHOW MORE "VIRUSES" ARTICLES

Ransomware

More About Ransomware
The Essential Guide to Ransomware
How_to_prevent_ransomnware-Thumb
How to Prevent Ransomware
What Is Ryuk Ransomware?
The Destructive Reality of Ransomware Attacks
How to Remove Ransomware from Android Devices
How to Remove Ransomware from Your iPhone or iPad
SHOW MORE "RANSOMWARE" ARTICLES

Other Threats

More About Other Threats
Is_this_website_safe-Your_complete_website_safety_check_guide-Thumb
Is This Website Safe? Your Complete Website Safety Check Guide
What Are QR Codes and How Do You Scan Them?
What Is Cryptocurrency and How Does It Work?
How to Spot Fake News
Instagram Phishing Scams — How to Spot & Avoid Scammers
ATM Skimming: What Is It and How to Spot a Skimmer
SHOW MORE "OTHER THREATS" ARTICLES

Passwords

More About Passwords
How_to_Password_Protect_a_File_or_Folder_in_Windows-Thumb
Step-By-Step Guide to Password Protect a File or Folder in Windows
How Does Two-Factor Authentication (2FA) Work?
How to Choose the Best Password Manager
How to Create a Strong Password
The Top Password Cracking Techniques Used by Hackers
How_to_Recover_or_Reset_Forgotten_Windows_Passwords-Thumb
How to Recover or Reset Forgotten Windows Passwords
SHOW MORE "PASSWORDS" ARTICLES

Internet of Things

More About Internet of Things
What_Is_the_Internet_of_Things-Thumb
What is the Internet of Things (IoT)?
Is Alexa Always Listening? How to Protect Your Privacy
How to Stop Your Smart TV From Spying on You
Internet_of_Things_Security_Risks-Thumb
Internet of Things Security Risks
What_is_a_smart_home-Thumb
What is a Smart Home?
How_to_Make_Your_Home_a_Smart_Home-Thmub
How to Build a Smart Home: A Beginner’s Guide
SHOW MORE "IoT" ARTICLES

Business

More About Business
What is cybersecurity?
IT Disaster Recovery Plans
What Is a Wildcard Certificate and How Does It Work?
Business Continuity Plan (BCP): What Is It and How to Make One
OPSEC: What Is It and How Does It Work?
What Is the Cyber Kill Chain and How Does It Work?
SHOW MORE "BUSINESS" ARTICLES

Tags

MOBILE DESKTOP SOCIAL MEDIA EMAIL IOS ANDROID WINDOWS MAC

What's New on Avast Academy

Security
Privacy
Performance
  • What Are QR Codes and How Do You Scan Them?
  • What Is Cryptocurrency and How Does It Work?
  • How to Spot Fake News
  • Instagram Phishing Scams — How to Spot & Avoid Scammers
  • ATM Skimming: What Is It and How to Spot a Skimmer
  • Stuxnet: What Is It & How Does It Work?
  • What Is Cyberstalking and How to Stop It
  • How to Spot and Avoid Gift Card Scams
  • Social Engineering and How to Prevent It
  • What Exactly Is a Virtual Machine and How Do They Work?
  • The Dark Web Browser: What Is Tor, Is it Safe, and How to Use It
  • How to Watch TV Online
  • What Is the Best Browser for Privacy and Security?
  • How to View and Delete Incognito History
  • How to Unblock Websites at School, Home, or Work
  • How to Spot and Prevent IP Spoofing
  • How to Set Up and Control Google SafeSearch
  • How to Manage and Remove Firefox Add-ons
  • What Is Incognito Mode and Is It Safe?
  • How to Change Your IP Address — a Step-by-Step Guide
  • How to Start Your Mac in Safe Mode
  • How to Check and Monitor Your CPU Temperature
  • How to Check How Much RAM You Have on Windows PC or Mac
  • How to Increase Your Internet Speed Right Now
  • Best Duplicate File Finders & Remover Tools for Windows
  • How to Check Specs on Windows PC
  • What Are Junk Files and How to Remove Them
  • How to Stress Test Your PC’s CPU
  • How to Clear Storage on iPhone: Cache, Documents, and Data
  • How to Defrag Windows 10, Windows 8, and Windows 7 Hard Drives

Free Security Tools

  • Free Virus Scanner and Removal Tool
  • Free Ransomware Protection
  • Free Rootkit Scanner & Remover
  • Free Trojan Scanner & Remover
  • Free Adware Scanner & Cleaner
  • Free Malware Scanner & Remover
  • Free Spyware Scanner & Remover

For Home

  • Support
  • Security
  • Privacy
  • Performance
  • Blog
  • Forum

For Business

  • Business support
  • Business products
  • Business partners
  • Business blog
  • Affiliates

For Partners

  • Mobile Carriers

Company

  • Contact Us
  • Investors
  • Careers
  • Press Center
  • Responsibility
  • Technology
  • Research Participation
1988-2022 Copyright Avast Software s.r.o.
  • Privacy policy
  • Legal
  • Report vulnerability
  • Contact security
  • Modern Slavery Statement
  • Do not sell my info
  • Cookie Preferences