11800062683
Logo Ameba Icon Security Icon Security White Icon Privacy Icon Performance Icon Privacy Icon Security Icon Performance Icons/45/01 Security/Other-Threats Icons / 32 / Bloatware removal Icons / 32 / Registry Cleaner Icons / 32 / CleanUp Icons / Feature / 32 / Mac Icons / 32 / Browser cleanup Icons/32/01 Security/Malware Icons/32/01 Security/Viruses Icons/32/01 Security/Other-Threats Icons/32/01 Security/Passwords Icons/32/01 Security/Ransomware Icons/32/01 Security/Business Icons/32/02 Privacy/Browser Icons/32/02 Privacy/IP adress Icons/32/02 Privacy/VPN Icons/32/02 Privacy/Proxy Icons/32/02 Privacy/Streaming Icons/32/03 Performance/Celaning Icons/32/03 Performance/Drivers Icons/32/03 Performance/Gaming Icons/32/03 Performance/Hardware Icons/32/03 Performance/Speed Icons / 32 / Bloatware removal Icons / 32 / Registry Cleaner Win Icons / 32 / CleanUp Icons / Feature / 32 / Mac Icons / 32 / Browser cleanup Icons/60/02 Privacy/02_Privacy Icons/60/01 Security/01_Security Icons/60/03 Performance/03_Performance Icons/80/01 Security/IoT Icons/80/01 Security/Malware Icons/80/01 Security/Passwords Icons/80/01 Security/Ransomware Icons/80/01 Security/Viruses Icons/80/01 Security/Other-Threats Icons/80/03 Security/Business Icons/80/02 Privacy/Browser Icons/80/02 Privacy/IP adress Icons/80/02 Privacy/VPN Icons/80/02 Privacy/Proxy Icons/80/02 Privacy/Streaming Icons/80/03 Performance/Celaning Icons/80/03 Performance/Drivers Icons/80/03 Performance/Gaming Icons/80/03 Performance/Hardware Icons/80/03 Performance/Speed Icons/80/03 Performance/03_Performance Icons/80/02 Privacy/02_Privacy
Avast
academy
Close
  • For home For home Products for PC and mobile phone protection
  • For business For business Protect your business with Avast
  • For partners For partners Partner with Avast and boost your business
  • About us About us Carriers, investors, media, contact
  • Blogs Academy, Blog, Decoded, Forum
  • Search
  • English
  • Blogs
  • Avast Blog Read about recent news from the security world
  • Avast Academy Best point of reference about cyber attacks
  • Avast Decoded In-depth technical articles regarding security threats
  • Avast Forum Discuss with the community
  • Select region
    • English
    • Čeština
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Polski
    • Português
    • Русский
Academy
  • Security
      • Malware
      • Viruses
      • Ransomware
      • Dark Web
      • Other Threats
      • Passwords
      • Internet of Things
      • Business
    See all Security articles
  • Privacy
      • Browser
      • IP Address
      • VPN
      • Streaming
      • Proxy
    See all Privacy articles
  • Performance
      • Speed
      • Cleaning
      • Hardware
      • Drivers
      • Gaming
    See all Performance articles
Avast
academy
  • Security
    • Malware
    • Viruses
    • Ransomware
    • Dark Web
    • Other Threats
    • Passwords
    • Internet of Things
    • Business
    See all Security articles
  • Privacy
    • Browser
    • IP Address
    • VPN
    • Streaming
    • Proxy
    See all Privacy articles
  • Performance
    • Speed
    • Cleaning
    • Hardware
    • Drivers
    • Gaming
    See all Performance articles
  • English
    • English
    • Čeština
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Polski
    • Português
    • Русский
academy
  • Security
    • Malware
    • Viruses
    • Ransomware
    • Dark Web
    • Other Threats
    • Passwords
    • Internet of Things
    • Business
    View all topics
  • Privacy
    • Browser
    • IP Address
    • VPN
    • Streaming
    • Proxy
    View all topics
  • Performance
    • Speed
    • Cleaning
    • Hardware
    • Drivers
    • Gaming
    View all topics
  • English
    • English
    • Čeština
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Polski
    • Português
    • Русский
Menu
academy
Security
  • Malware
  • Viruses
  • Ransomware
  • Dark Web
  • Other Threats
  • Passwords
  • Internet of Things
  • Business
Privacy
  • Browser
  • IP Address
  • VPN
  • Streaming
  • Proxy
Performance
  • Speed
  • Cleaning
  • Hardware
  • Drivers
  • Gaming
English
Security
Security
Malware
Viruses
Ransomware
Dark Web
Other Threats
Passwords
Internet of Things
Business
See all Security articles
Privacy
Privacy
Browser
IP Address
VPN
Streaming
Proxy
See all Privacy articles
Performance
Performance
Speed
Cleaning
Hardware
Drivers
Gaming
See all Performance articles
Select language
Select language
English
Čeština
Deutsch
Español
Français
Italiano
日本語
Polski
Português
Русский

Security

We’ve been fighting viruses since 1988 — so we know how to keep you secure. Learn from our experts and get the skills you need to stay safe against online threats.

Malware
Viruses
Ransomware
Dark Web
Other Threats
Passwords
Internet of Things
Business
Avast Academy Security

Malware

More About Malware
What_Is_Malware-Thumb
What Is Malware and How to Protect Against Malware Attacks?
What Is Scareware? Detection, Prevention, and Removal
What Is Pegasus Spyware and Is Your Phone Infected with Pegasus?
How to Detect and Remove Spyware From an iPhone
Zeus_trojan-Thumb
The Zeus Trojan: What it is, How it Works, and How to Stay Safe
How to Detect and Remove a Keylogger
How to Remove Spigot From Your Mac
Rootkit-Thumb
What Is a Rootkit and How to Remove It?
SHOW MORE "MALWARE" ARTICLES

Viruses

More About Viruses
What Is a Computer Virus and How Does It Work?
Can Macs Get Viruses?
Stuxnet: What Is It & How Does It Work?
How to Remove a Virus From an iPhone and iPad
The Best Free Antivirus Software in 2023
How to Remove a Virus From Your Router
SHOW MORE "VIRUSES" ARTICLES

Ransomware

More About Ransomware
The Essential Guide to Ransomware
How_to_prevent_ransomnware-Thumb
How to Prevent Ransomware
What Is Ryuk Ransomware?
The Destructive Reality of Ransomware Attacks
How to Remove Ransomware from Android Devices
How to Remove Ransomware from Your iPhone or iPad
SHOW MORE "RANSOMWARE" ARTICLES

Dark Web

More About Dark Web
Dark Web Links: The Best Onion and Tor Sites in 2022
Dark Web Search: The Best Dark Web Search Engines in 2023
A Guide to the Silk Road Dark Web
What Is the Dark Web and How to Access It?
Everything You Need to Know About Dark Web Scanning
SHOW MORE "DARK WEB" ARTICLES

Other Threats

More About Other Threats
Is_this_website_safe-Your_complete_website_safety_check_guide-Thumb
Is This Website Safe? Your Complete Website Safety Check Guide
How to Know If Your Phone Has Been Hacked
How to Avoid Sugar Daddy Scams
How to Find a Lost or Stolen Android Phone
Spam Text Messages (SMS) — How to Stop or Block Spam Texts
How to Avoid Amazon Scams
SHOW MORE "OTHER THREATS" ARTICLES

Passwords

More About Passwords
How_to_Password_Protect_a_File_or_Folder_in_Windows-Thumb
Step-By-Step Guide to Password Protect a File or Folder in Windows
How Does Two-Factor Authentication (2FA) Work?
How to Choose the Best Password Manager
How to Create a Strong Password
The Top Password Cracking Techniques Used by Hackers
How_to_Recover_or_Reset_Forgotten_Windows_Passwords-Thumb
How to Recover or Reset Forgotten Windows Passwords
SHOW MORE "PASSWORDS" ARTICLES

Internet of Things

More About Internet of Things
What_Is_the_Internet_of_Things-Thumb
What is the Internet of Things (IoT)?
Is Alexa Always Listening? How to Protect Your Privacy
How to Stop Your Smart TV From Spying on You
Internet_of_Things_Security_Risks-Thumb
Internet of Things Security Risks
What_is_a_smart_home-Thumb
What is a Smart Home?
How_to_Make_Your_Home_a_Smart_Home-Thmub
How to Build a Smart Home: A Beginner’s Guide
SHOW MORE "IoT" ARTICLES

Business

More About Business
What is cybersecurity?
IT Disaster Recovery Plans
What Is a Wildcard Certificate and How Does It Work?
Business Continuity Plan (BCP): What Is It and How to Make One
OPSEC: What Is It and How Does It Work?
What Is the Cyber Kill Chain and How Does It Work?
SHOW MORE "BUSINESS" ARTICLES

Tags

MOBILE WINDOWS DESKTOP SOCIAL MEDIA ANDROID IOS MAC EMAIL

What's New on Avast Academy

Security
Privacy
Performance
  • How to Know If Your Phone Has Been Hacked
  • What Is Malware and How to Protect Against Malware Attacks?
  • How to Avoid Sugar Daddy Scams
  • How to Find a Lost or Stolen Android Phone
  • Spam Text Messages (SMS) — How to Stop or Block Spam Texts
  • What Is Scareware? Detection, Prevention, and Removal
  • How to Avoid Amazon Scams
  • The Best Internet Security Software in 2023
  • What Is Doxxing, Is Doxxing Illegal, and How Do You Prevent It?
  • What Is Web 3.0 (Web3 definition)?
  • How to Set Parental Controls on Windows 10
  • How to Change Your Netflix Region and Avoid Geo-Restrictions
  • How to Change the Location on Your iPhone
  • How to Unblock YouTube Videos From Any Location
  • Proxy vs VPN vs Tor: What Are the Differences?
  • What Is Biometrics and How Secure Is Biometric Data?
  • What Are the Benefits of a VPN?
  • What Is Cryptography and How Does It Work?
  • Private Browsing Mode: What Is It and How to Turn It On or Off In Any Browser
  • What Is a P2P VPN Server and How Does P2P Work?
  • 8 Reasons Why Your Phone Is Overheating
  • How to Fix Mac’s Startup Disk Full Error Message
  • How to Manage and Delete Photos and Files From iCloud
  • AMD vs. Nvidia: Which Is the Best GPU?
  • AMD vs Intel: Which CPU Is Better in 2023?
  • What Is a Solid-State Drive (SSD)?
  • How to Hide Apps on an Android Phone
  • How to Speed Up Your Phone’s Slow Data & Internet: Reasons & Fixes
  • What Is RAM and Why Is It Important?
  • How to Safely Overclock Your CPU for PCs & Laptops

Free Security Tools

  • Internet Security Software
  • Free Virus Scanner and Removal Tool
  • Free Ransomware Protection
  • Free Rootkit Scanner & Remover
  • Free Trojan Scanner & Remover
  • Free Adware Scanner & Cleaner
  • Free Malware Scanner & Remover
  • Free Spyware Scanner & Remover
Security
19-01-2016

For Home

  • Support
  • Security
  • Privacy
  • Performance
  • Blog
  • Forum

For Business

  • Business support
  • Business products
  • Business partners
  • Business blog
  • Affiliates

For Partners

  • Mobile Carriers

Company

  • Contact Us
  • Investors
  • Careers
  • Press Center
  • Responsibility
  • Technology
  • Research Participation
1988-2023 Copyright Avast Software s.r.o.
  • Privacy policy
  • Legal
  • Report vulnerability
  • Contact security
  • Modern Slavery Statement
  • Do not sell my info
  • Cookie Preferences