11800062683
Logo Ameba Icon Security Icon Security White Icon Privacy Icon Performance Icon Privacy Icon Security Icon Performance Icons/45/01 Security/Other-Threats Icons / 32 / Bloatware removal Icons / 32 / Registry Cleaner Icons / 32 / CleanUp Icons / Feature / 32 / Mac Icons / 32 / Browser cleanup Icons/32/01 Security/Malware Icons/32/01 Security/Viruses Icons/32/01 Security/Other-Threats Icons/32/01 Security/phishing Icons/32/01 Security/Scams Icons/32/01 Security/hacking Icons/32/01 Security/Security-tips Icons/32/01 Privacy/Privacy-tips Icons/32/01 Performance/Software Icons/32/01 Privacy/Identity-Protection Icons/32/01 Privacy/Digital-life Icons/32/01 Performance/Performance-tips Icons/32/01 Security/Passwords Icons/32/01 Security/Ransomware Icons/32/01 Security/Business Icons/32/02 Privacy/Browser Icons/32/02 Privacy/IP adress Icons/32/02 Privacy/VPN Icons/32/02 Privacy/Proxy Icons/32/02 Privacy/Streaming Icons/32/03 Performance/Celaning Icons/32/03 Performance/Drivers Icons/32/03 Performance/Gaming Icons/32/03 Performance/Hardware Icons/32/03 Performance/Speed Icons / 32 / Bloatware removal Icons / 32 / Registry Cleaner Icons / 32 / CleanUp Icons / Feature / 32 / Mac Icons / 32 / Browser cleanup Icons/60/02 Privacy/02_Privacy Icons/60/01 Security/01_Security Icons/60/03 Performance/03_Performance Icons/45/01 Security/phishing Icons/45/01 Security/Scams Icons/45/01 Security/hacking Icons/45/01 Security/Security-tips Icons/45/01 Privacy/Privacy-tips Icons/45/01 Performance/Software Icons/45/01 Privacy/Identity-Protection Icons/45/01 Privacy/Digital-life Icons/45/01 Performance/Performance-tips Icons/80/01 Security/phishing Icons/80/01 Security/Scams Icons/80/01 Security/hacking Icons/80/01 Security/Security-tips Icons/80/01 Privacy/Privacy-tips Icons/80/01 Performance/Software Icons/80/01 Privacy/Identity-Protection Icons/80/01 Privacy/Digital-life Icons/80/01 Performance/Performance-tips Icons/80/01 Security/IoT Icons/80/01 Security/Malware Icons/80/01 Security/Passwords Icons/80/01 Security/Ransomware Icons/80/01 Security/Viruses Icons/80/01 Security/Other-Threats Icons/80/03 Security/Business Icons/80/02 Privacy/Browser Icons/80/02 Privacy/IP adress Icons/80/02 Privacy/VPN Icons/80/02 Privacy/Proxy Icons/80/02 Privacy/Streaming Icons/80/03 Performance/Celaning Icons/80/03 Performance/Drivers Icons/80/03 Performance/Gaming Icons/80/03 Performance/Hardware Icons/80/03 Performance/Speed Icons/80/03 Performance/03_Performance Icons/80/02 Privacy/02_Privacy
academy
Close
  • For home For home Products for PC and mobile phone protection
  • For business For business Protect your business with Avast
  • For partners For partners Partner with Avast and boost your business
  • About us About us Carriers, investors, media, contact
  • Blogs Academy, Blog, Decoded, Forum
  • Search
  • English
  • Blogs
  • Avast Blog Read about recent news from the security world
  • Avast Academy Best point of reference about cyber attacks
  • Avast Decoded In-depth technical articles regarding security threats
  • Avast Forum Discuss with the community
  • Select region
    • English
    • Čeština
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Polski
    • Português
    • Русский
Academy
  • Security
      • Malware
      • Viruses
      • Ransomware
      • Phishing
      • Scams
      • Hacking
      • Other Threats
      • Passwords
      • Business
      • Security Tips
    See all Security articles
  • Privacy
      • Browser
      • IP Address
      • VPN
      • Streaming
      • Identity Protection
      • Dark Web
      • Digital Life
      • Privacy Tips
    See all Privacy articles
  • Performance
      • Speed
      • Cleaning
      • Gaming
      • Hardware
      • Software
      • Drivers
      • Performance Tips
    See all Performance articles
academy
  • Security
    • Malware
    • Viruses
    • Ransomware
    • Phishing
    • Scams
    • Hacking
    • Other Threats
    • Passwords
    • Business
    • Security Tips
    See all Security articles
  • Privacy
    • Browser
    • IP Address
    • VPN
    • Streaming
    • Identity Protection
    • Dark Web
    • Digital Life
    • Privacy Tips
    See all Privacy articles
  • Performance
    • Speed
    • Cleaning
    • Gaming
    • Hardware
    • Software
    • Drivers
    • Performance Tips
    See all Performance articles
  • English
    • English
    • Čeština
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Polski
    • Português
    • Русский
academy
Menu
academy
Security
Malware Viruses Ransomware Phishing Scams Hacking Other Threats Passwords Business Security Tips See all Security articles
Privacy
Browser IP Address VPN Streaming Identity Protection Dark Web Digital Life Privacy Tips See all Privacy articles
Performance
Speed Cleaning Gaming Hardware Software Drivers Performance Tips See all Performance articles
English
English Čeština Deutsch Español Français Italiano 日本語 Polski Português Русский

Security

We’ve been fighting viruses since 1988 — so we know how to keep you secure. Learn from our experts and get the skills you need to stay safe against online threats.

Malware
Viruses
Ransomware
Phishing
Scams
Hacking
Other Threats
Passwords
Business
Security Tips
Avast Academy Security

Malware

More About Malware
What Is Malware and How to Protect Against Malware Attacks?
What is fileless malware, and how can you help prevent it?
Can You Run Windows Defender and Avast at the Same Time?
Malicious Code: What Is It and How Can You Prevent It?
Spyware-Thumb
What Is Spyware, Who Can Be Attacked, and How to Prevent It
What Is Scareware? Detection, Prevention, and Removal
Pegasus Spyware: What Is It and Is It on My Phone?
How to Detect and Remove Spyware From an iPhone
SHOW MORE "MALWARE" ARTICLES

Viruses

More About Viruses
What Is a Computer Virus and How Does It Work?
How to Check for Viruses on iPhone
iPhone Viruses: Can My Phone Get Infected?
Fake Viruses: How Do You Know If a Virus Alert Is Real?
The 7 Most Dangerous New Computer Viruses & Malware
Can Macs Get Viruses?
SHOW MORE "VIRUSES" ARTICLES

Ransomware

More About Ransomware
What Is Ransomware and How to Prevent It
What Is Ryuk Ransomware?
The Destructive Reality of Ransomware Attacks
How to Remove Ransomware from Android Devices
How to Remove Ransomware from Your iPhone or iPad
CryptoLocker-Thumb
What is CryptoLocker Ransomware and How to Remove it
SHOW MORE "RANSOMWARE" ARTICLES

Phishing

More About Phishing
What Is Smishing and How to Avoid It
What Is Vishing? Definition, Attack Methods & Prevention
How to Spot and Prevent IP Spoofing
How to Spot Amazon Phishing Emails and Beat Scammers
Pharming-Thumb
What Is Pharming and How to Protect Against It
Spear Phishing: What Is It and How Can You Avoid It?
SHOW MORE "PHISHING" ARTICLES

Scams

More About Scams
A Nigerian prince wearing a gold crown and surrounded by coins.
What is the Nigerian Prince scam?
Block Mobile Scams Instantly with AI-Powered Scam Guardian Pro
How to Avoid eBay Scams: A Comprehensive Guide
How to Spot and Avoid Fake Emails Supposedly from Avast
Is Ticketmaster Legit?
Scam Likely Calls: What Are They and How Can You Block Them
SHOW MORE "SCAMS" ARTICLES

Hacking

More About Hacking
What is a dictionary attack?
What is a script kiddie?
What Is a Honeypot and How Does It Help Trap Hackers?
Ethical Hacking: What It Is and How To Do It
How to Tell If Your Phone Is Tapped and What You Can Do About It
Has My Amazon Account Been Hacked?
SHOW MORE "HACKING" ARTICLES

Other Threats

More About Other Threats
Is BlueStacks safe?
What Is Riskware and How to Avoid It
Is Roblox Safe for Kids?
Juice Jacking: What It Is and How to Protect Your Devices
What Is Hugging Face?
What Can Scammers Do With Your Number and How Can You Help Protect It?
SHOW MORE "OTHER THREATS" ARTICLES

Passwords

More About Passwords
Credential Stuffing: What It Is and How To Prevent It
How to View Saved Passwords in Chrome: Step-by-Step Guide
How Does Two-Factor Authentication (2FA) Work?
How to Password Protect a Folder or File in Windows
How to Choose the Best Password Manager
Strong Password Examples and How to Create Them
SHOW MORE "PASSWORDS" ARTICLES

Business

More About Business
What Are Intrusion Detection Systems (IDS) and How Do They Work
What is SOC 2? Your Guide to SOC Certification and Compliance
What Is a Security Operations Center (SOC)?
What is cybersecurity?
What Is an IT Disaster Recovery Plan and Why Business Continuity Matters
What Is a Wildcard Certificate and How Does It Work?
SHOW MORE "BUSINESS" ARTICLES

Security Tips

More About Security Tips
Is Mercari legit? A guide to safe shopping and avoiding scams
Is WeTransfer Safe?
Is Poshmark Legit?
Is WhatsApp Safe?
Is Apple Pay Safe?
How to Bypass Apple Activation Lock (and Which Methods to Avoid)
SHOW MORE "SECURITY TIPS" ARTICLES

Tags

MOBILE DESKTOP WINDOWS ANDROID MAC IOS EMAIL SOCIAL MEDIA

What's New on Avast Academy

Security
Privacy
Performance
  • Is Mercari legit? A guide to safe shopping and avoiding scams
  • Is BlueStacks safe?
  • Credential Stuffing: What It Is and How To Prevent It
  • What is the Nigerian Prince scam?
  • Is WeTransfer Safe?
  • What is a dictionary attack?
  • Is Poshmark Legit?
  • What Is Riskware and How to Avoid It
  • Block Mobile Scams Instantly with AI-Powered Scam Guardian Pro
  • What is fileless malware, and how can you help prevent it?
  • What Is VPN Split Tunneling?
  • VPN Kill Switch: What It Is and Why It Matters
  • How to Prevent Elder Financial Abuse
  • What Is a Replay Attack and How Does It Work?
  • What Is VoIP and How Does It Work?
  • What to do if you lose your wallet
  • How to Find Hidden Apps on Android
  • Six New Ways Avast Secure Browser Helps Keep You Safe, Private, and in Control
  • Is TikTok Shop Safe and Legit?
  • Is AliExpress Legit? How to Buy From AliExpress Safely
  • What Is Firmware?
  • Facebook Session Expired: Causes, Solutions, and Prevention
  • How to Get Your Mouse Cursor Back: 11 Tried and Tested Methods
  • How to Split Screens on Your PC or Laptop (Windows 10 & 11)
  • Your Phone Is Not Registered On a Network: What It Means and How to Fix It
  • How to Update Apps on an Android Phone
  • How to Clear the Instagram Cache on Your Device
  • The Applications Folder on Mac: How to Find and Access Your Apps
  • How to Clear System Data or “Other” Storage from Your iPhone
  • How to Fix Corrupted Files on Windows Using SFC And DISM

Free Security Tools

  • Free AI-powered Scam Detector Download
  • Download Free Cybersecurity Software
  • Free Rootkit Scanner and Removal Tool
  • Free Trojan Scanner and Removal Tool
  • Internet Security Software
  • Free Anti-Ransomware Protection & Removal Tool
  • Download Adware Removal and Cleaner Tool for Free
  • Free Malware Scanner and Removal Tool Download
  • Free Anti-Spyware Scanner and Remover
Security
19-01-2016

Get free virus and malware protection for PC with Avast Free Antivirus

Free download

Get free virus and malware protection for Mac with Avast Security

Free download

Get free virus and malware protection for Android with Avast Mobile Security

Avast
Mobile Security

Free install

Get free threat protection for your iPhone with Avast Mobile Security

Avast
Mobile Security

Free install
Avast
https://4650993.fs1.hubspotusercontent-na1.net/hubfs/4650993/New_Avast_Academy/academy_new_awards_2025/avtest_certified_homeuser_2025-02.png 2025
Top Rated
Product
https://4650993.fs1.hubspotusercontent-na1.net/hubfs/4650993/New_Avast_Academy/academy_new_awards_2025/award_48487_3032117_stars3.png 2025
3 Stars
Advanced+

Get free virus and malware protection for PC with Avast Free Antivirus

Free download
Avast
https://4650993.fs1.hubspotusercontent-na1.net/hubfs/4650993/New_Avast_Academy/academy_new_awards_2025/avtest_certified_homeuser_2025-02.png 2025
Top Rated
Product
https://4650993.fs1.hubspotusercontent-na1.net/hubfs/4650993/New_Avast_Academy/academy_new_awards_2025/award_48487_3032117_stars3.png 2025
3 Stars
Advanced+

Get free virus and malware protection for Mac with Avast Security

Free download
Avast
https://4650993.fs1.hubspotusercontent-na1.net/hubfs/4650993/New_Avast_Academy/academy_new_awards_2025/avtest_certified_homeuser_2025-02.png 2025
Top Rated
Product
https://4650993.fs1.hubspotusercontent-na1.net/hubfs/4650993/New_Avast_Academy/academy_new_awards_2025/award_48487_3032117_stars3.png 2025
3 Stars
Advanced+

Get free virus and malware protection for Android with Avast Mobile Security

Free install
Avast
https://4650993.fs1.hubspotusercontent-na1.net/hubfs/4650993/New_Avast_Academy/academy_new_awards_2025/avtest_certified_homeuser_2025-02.png 2025
Top Rated
Product
https://4650993.fs1.hubspotusercontent-na1.net/hubfs/4650993/New_Avast_Academy/academy_new_awards_2025/award_48487_3032117_stars3.png 2025
3 Stars
Advanced+

Get free threat protection for your iPhone with Avast Mobile Security

Free install

For Home

  • Support
  • Security
  • Privacy
  • Performance
  • Blog
  • Forum

For Business

  • Business support
  • Business products
  • Business partners
  • Business blog
  • Affiliates

For Partners

  • Mobile Carriers

Company

  • Contact Us
  • Careers
  • Press Center
  • Digital trust
  • Technology
  • Research Participation
© 2026 Gen Digital Inc. All rights reserved.
  • Privacy policy
  • Legal
  • Report vulnerability
  • Contact security
  • Modern Slavery Statement
  • Do not sell my info
  • Cookie Settings