11800062683
Logo Ameba Icon Security Icon Security White Icon Privacy Icon Performance Icon Privacy Icon Security Icon Performance Icons/45/01 Security/Other-Threats Icons / 32 / Bloatware removal Icons / 32 / Registry Cleaner Icons / 32 / CleanUp Icons / Feature / 32 / Mac Icons / 32 / Browser cleanup Icons/32/01 Security/Malware Icons/32/01 Security/Viruses Icons/32/01 Security/Other-Threats Icons/32/01 Security/phishing Icons/32/01 Security/Scams Icons/32/01 Security/hacking Icons/32/01 Security/Security-tips Icons/32/01 Privacy/Privacy-tips Icons/32/01 Performance/Software Icons/32/01 Privacy/Identity-Protection Icons/32/01 Privacy/Digital-life Icons/32/01 Performance/Performance-tips Icons/32/01 Security/Passwords Icons/32/01 Security/Ransomware Icons/32/01 Security/Business Icons/32/02 Privacy/Browser Icons/32/02 Privacy/IP adress Icons/32/02 Privacy/VPN Icons/32/02 Privacy/Proxy Icons/32/02 Privacy/Streaming Icons/32/03 Performance/Celaning Icons/32/03 Performance/Drivers Icons/32/03 Performance/Gaming Icons/32/03 Performance/Hardware Icons/32/03 Performance/Speed Icons / 32 / Bloatware removal Icons / 32 / Registry Cleaner Win Icons / 32 / CleanUp Icons / Feature / 32 / Mac Icons / 32 / Browser cleanup Icons/60/02 Privacy/02_Privacy Icons/60/01 Security/01_Security Icons/60/03 Performance/03_Performance Icons/45/01 Security/phishing Icons/45/01 Security/Scams Icons/45/01 Security/hacking Icons/45/01 Security/Security-tips Icons/45/01 Privacy/Privacy-tips Icons/45/01 Performance/Software Icons/45/01 Privacy/Identity-Protection Icons/45/01 Privacy/Digital-life Icons/45/01 Performance/Performance-tips Icons/80/01 Security/phishing Icons/80/01 Security/Scams Icons/80/01 Security/hacking Icons/80/01 Security/Security-tips Icons/80/01 Privacy/Privacy-tips Icons/80/01 Performance/Software Icons/80/01 Privacy/Identity-Protection Icons/80/01 Privacy/Digital-life Icons/80/01 Performance/Performance-tips Icons/80/01 Security/IoT Icons/80/01 Security/Malware Icons/80/01 Security/Passwords Icons/80/01 Security/Ransomware Icons/80/01 Security/Viruses Icons/80/01 Security/Other-Threats Icons/80/03 Security/Business Icons/80/02 Privacy/Browser Icons/80/02 Privacy/IP adress Icons/80/02 Privacy/VPN Icons/80/02 Privacy/Proxy Icons/80/02 Privacy/Streaming Icons/80/03 Performance/Celaning Icons/80/03 Performance/Drivers Icons/80/03 Performance/Gaming Icons/80/03 Performance/Hardware Icons/80/03 Performance/Speed Icons/80/03 Performance/03_Performance Icons/80/02 Privacy/02_Privacy
Avast
academy
Close
  • For home For home Products for PC and mobile phone protection
  • For business For business Protect your business with Avast
  • For partners For partners Partner with Avast and boost your business
  • About us About us Carriers, investors, media, contact
  • Blogs Academy, Blog, Decoded, Forum
  • Search
  • English
  • Blogs
  • Avast Blog Read about recent news from the security world
  • Avast Academy Best point of reference about cyber attacks
  • Avast Decoded In-depth technical articles regarding security threats
  • Avast Forum Discuss with the community
  • Select region
    • English
    • Čeština
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Polski
    • Português
    • Русский
Academy
  • Security
      • Malware
      • Viruses
      • Ransomware
      • Phishing
      • Scams
      • Hacking
      • Other Threats
      • Passwords
      • Business
      • Security Tips
    See all Security articles
  • Privacy
      • Browser
      • IP Address
      • VPN
      • Streaming
      • Identity Protection
      • Dark Web
      • Digital Life
      • Privacy Tips
    See all Privacy articles
  • Performance
      • Speed
      • Cleaning
      • Gaming
      • Hardware
      • Software
      • Drivers
      • Performance Tips
    See all Performance articles
Avast
academy
  • Security
    • Malware
    • Viruses
    • Ransomware
    • Phishing
    • Scams
    • Hacking
    • Other Threats
    • Passwords
    • Business
    • Security Tips
    See all Security articles
  • Privacy
    • Browser
    • IP Address
    • VPN
    • Streaming
    • Identity Protection
    • Dark Web
    • Digital Life
    • Privacy Tips
    See all Privacy articles
  • Performance
    • Speed
    • Cleaning
    • Gaming
    • Hardware
    • Software
    • Drivers
    • Performance Tips
    See all Performance articles
  • English
    • English
    • Čeština
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Polski
    • Português
    • Русский
academy
  • Security
    • Malware
    • Viruses
    • Ransomware
    • Phishing
    • Scams
    • Hacking
    • Other Threats
    • Passwords
    • Business
    • Security Tips
    View all topics
  • Privacy
    • Browser
    • IP Address
    • VPN
    • Streaming
    • Identity Protection
    • Dark Web
    • Digital Life
    • Privacy Tips
    View all topics
  • Performance
    • Speed
    • Cleaning
    • Gaming
    • Hardware
    • Software
    • Drivers
    • Performance Tips
    View all topics
  • English
    • English
    • Čeština
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Polski
    • Português
    • Русский
Menu
academy
Security
  • Malware
  • Viruses
  • Ransomware
  • Phishing
  • Scams
  • Hacking
  • Other Threats
  • Passwords
  • Business
  • Security Tips
Privacy
  • Browser
  • IP Address
  • VPN
  • Streaming
  • Identity Protection
  • Dark Web
  • Digital Life
  • Privacy Tips
Performance
  • Speed
  • Cleaning
  • Gaming
  • Hardware
  • Software
  • Drivers
  • Performance Tips
English
Security
Security
Malware
Viruses
Ransomware
Phishing
Scams
Hacking
Other Threats
Passwords
Business
Security Tips
See all Security articles
Privacy
Privacy
Browser
IP Address
VPN
Streaming
Identity Protection
Dark Web
Digital Life
Privacy Tips
See all Privacy articles
Performance
Performance
Speed
Cleaning
Gaming
Hardware
Software
Drivers
Performance Tips
See all Performance articles
Select language
Select language
English
Čeština
Deutsch
Español
Français
Italiano
日本語
Polski
Português
Русский

Security

We’ve been fighting viruses since 1988 — so we know how to keep you secure. Learn from our experts and get the skills you need to stay safe against online threats.

Malware
Viruses
Ransomware
Phishing
Scams
Hacking
Other Threats
Passwords
Business
Security Tips
Avast Academy Security

Malware

More About Malware
What_Is_Malware-Thumb
What Is Malware and How to Protect Against Malware Attacks?
What Is Scareware? Detection, Prevention, and Removal
What Is Pegasus Spyware and Is Your Phone Infected with Pegasus?
What Is the Mirai Botnet?
Zeus_trojan-Thumb
The Zeus Trojan: What it is, How it Works, and How to Stay Safe
How to Remove a Virus From Your Router
Trojan-Thumb
What Is Trojan Malware? The Ultimate Guide
Keylogger-Thumb
What Are Keyloggers and How Do They Work?
SHOW MORE "MALWARE" ARTICLES

Viruses

More About Viruses
What Is a Computer Virus and How Does It Work?
Can Macs Get Viruses?
Stuxnet: What Is It & How Does It Work?
Macro Virus: What Is It and How to Remove It
Worm vs. Virus: What's the Difference and Does It Matter?
Can_Phones_Get_a_Virus-Thumb
Can Your iPhone or Android Phone Get a Virus?
SHOW MORE "VIRUSES" ARTICLES

Ransomware

More About Ransomware
The Essential Guide to Ransomware
How_to_prevent_ransomnware-Thumb
How to Prevent Ransomware
What Is Ryuk Ransomware?
The Destructive Reality of Ransomware Attacks
How to Remove Ransomware from Android Devices
How to Remove Ransomware from Your iPhone or iPad
SHOW MORE "RANSOMWARE" ARTICLES

Phishing

More About Phishing
How to Spot and Prevent IP Spoofing
How to Spot Amazon Phishing Emails and Beat Scammers
Pharming-Thumb
What Is Pharming and How to Protect Against It
Spear Phishing: What Is It and How Can You Avoid It?
What Is Phone Number Spoofing and How to Stop It
Spoofing-Thumb
What Is Spoofing and How Can I Prevent it?
SHOW MORE "PHISHING" ARTICLES

Scams

More About Scams
How to Avoid Amazon Scams
Is PayPal Safe? How to Spot and Avoid PayPal Scams
Instagram Phishing Scams — How to Spot & Avoid Scammers
How to Spot and Avoid Gift Card Scams
What Are Romance Scams and How to Avoid Them
How to Identify & Prevent Tech Support Scams
SHOW MORE "SCAMS" ARTICLES

Hacking

More About Hacking
How to Know If Your Phone Has Been Hacked
What Is an Evil Twin Attack and How Does It Work?
Hacker Types: Black Hat, White Hat, and Gray Hat Hackers
ATM Skimming: What Is It and How to Spot a Skimmer
DDoS-Distributed_Denial_of_Service-Thumb
What Is a Distributed Denial of Service (DDoS) Attack and How Does It Work?
What Is a Brute Force Attack?
SHOW MORE "HACKING" ARTICLES

Other Threats

More About Other Threats
How to See Sensitive Content on Twitter
What Are NFTs and How Do NFTs Work?
What Is Catfishing and How Do You Spot a Catfisher?
What to Do If Your Instagram Account Is Hacked
How to Avoid Sugar Daddy Scams
What Is a Security Breach?
SHOW MORE "OTHER THREATS" ARTICLES

Passwords

More About Passwords
How_to_Password_Protect_a_File_or_Folder_in_Windows-Thumb
Step-By-Step Guide to Password Protect a File or Folder in Windows
How Does Two-Factor Authentication (2FA) Work?
How to Choose the Best Password Manager
How to Create a Strong Password
The Top Password Cracking Techniques Used by Hackers
How_to_Recover_or_Reset_Forgotten_Windows_Passwords-Thumb
How to Recover or Reset Forgotten Windows Passwords
SHOW MORE "PASSWORDS" ARTICLES

Business

More About Business
What is cybersecurity?
IT Disaster Recovery Plans
What Is a Wildcard Certificate and How Does It Work?
Business Continuity Plan (BCP): What Is It and How to Make One
OPSEC: What Is It and How Does It Work?
What Is the Cyber Kill Chain and How Does It Work?
SHOW MORE "BUSINESS" ARTICLES

Security Tips

More About Security Tips
What Is Jailbreaking and Is It Safe?
How to Find a Lost or Stolen Android Phone
The Best Internet Security Software in 2023
What Is a Firewall and Why Do You Need One?
Internet Security: What It Is and How to Protect Yourself Online
What Is Penetration Testing? Stages, Methods, and Tools
SHOW MORE "SECURITY TIPS" ARTICLES

Tags

SOCIAL MEDIA MOBILE DESKTOP IOS ANDROID WINDOWS MAC EMAIL

What's New on Avast Academy

Security
Privacy
Performance
  • How to See Sensitive Content on Twitter
  • What Are NFTs and How Do NFTs Work?
  • What Is Catfishing and How Do You Spot a Catfisher?
  • What to Do If Your Instagram Account Is Hacked
  • What Is Jailbreaking and Is It Safe?
  • The Essential Guide to Ransomware
  • How to Know If Your Phone Has Been Hacked
  • What Is Malware and How to Protect Against Malware Attacks?
  • How to Avoid Sugar Daddy Scams
  • How to Find a Lost or Stolen Android Phone
  • How to Delete Your Google Search History
  • How Do I Fix the “Your Connection Is Not Private” Error?
  • An IRS Identity Protection PIN: What Is It & How to Get It?
  • How to Update Chrome on PC, Mac, Android, or iPhone
  • How to Download and Install Chrome on Your Mac
  • TCP vs UDP: What’s the Difference and Which Protocol Is Better?
  • The Most Secure Messaging Apps in 2023
  • How to Clear Your Browsing and Search History
  • How to Set Parental Controls on Windows 10
  • How to Change Your Netflix Region and Avoid Geo-Restrictions
  • How to Clear Your Cache on a Mac
  • What Is the Difference Between Thunderbolt and USB-C?
  • How to Turn off Safe Mode on Your Android Phone or Tablet
  • 8 Reasons Why Your Phone Is Overheating
  • How to Fix Mac’s Startup Disk Full Error Message
  • How to Manage and Delete Photos and Files From iCloud
  • AMD vs. Nvidia: Which Is the Best GPU?
  • What Is a RAR File and How Do I Open it?
  • AMD vs Intel: Which CPU Is Better in 2023?
  • What Is a Solid-State Drive (SSD)?

Free Security Tools

  • Internet Security Software
  • Free Virus Scanner and Removal Tool
  • Free Ransomware Protection
  • Free Rootkit Scanner & Remover
  • Free Trojan Scanner & Remover
  • Free Adware Scanner & Cleaner
  • Free Malware Scanner & Remover
  • Free Spyware Scanner & Remover
Security
19-01-2016

For Home

  • Support
  • Security
  • Privacy
  • Performance
  • Blog
  • Forum

For Business

  • Business support
  • Business products
  • Business partners
  • Business blog
  • Affiliates

For Partners

  • Mobile Carriers

Company

  • Contact Us
  • Investors
  • Careers
  • Press Center
  • Responsibility
  • Technology
  • Research Participation
1988-2023 Copyright Avast Software s.r.o.
  • Privacy policy
  • Legal
  • Report vulnerability
  • Contact security
  • Modern Slavery Statement
  • Do not sell my info
  • Cookie Preferences