academy
Security
Privacy
Performance
Select language

Email

Whether business or personal, your email account needs protection from scammers trying to steal your data or money. Learn how to detect phishing messages and stay secure.

Other Threats

What Is a Brute Force Attack?

The best passwords are long, complex, and avoid using simple names or well-known terms. That’s because short or obvious passwords won’t hold up for long against a brute force attack. But what exactly is a brute force attack? Discover how brute force ...

Read more
Other Threats

What Is a Brute Force Attack?

The best passwords are long, complex, and avoid using simple names or well-known terms. That’s because short or obvious ...

Other Threats

How to Identify and Prevent Apple ID Phishing Scams

Has an Apple phishing email ever slipped into your inbox? If the message asked for payment information or pressured you to click on a ...

Read more
Other Threats

How to Identify and Prevent Apple ID Phishing Scams

Has an Apple phishing email ever slipped into your inbox? If the message asked for payment information or pressured you ...

Browser

How to Download Your Google Data

You probably know that Google tracks and collects data about you. But did you know that you can make a Google data request to download Google data? You can use Google to download all the data they have on you, or just some of it. Learn what data the ...

Read more
Browser

How to Download Your Google Data

You probably know that Google tracks and collects data about you. But did you know that you can make a Google data ...

VPN

How to Send an Anonymous Email

Want to go anonymous online? You'll need more than just an incognito browser — you'll need an untraceable email address sent from a secure network, like Avast SecureLine VPN. An anonymous email address done right hides your true identity. From ...

Read more
VPN

How to Send an Anonymous Email

Want to go anonymous online? You'll need more than just an incognito browser — you'll need an untraceable email address ...

Browser

How to Protect Yourself From Identity Theft

Identity thieves are on the prowl. Their cause is unrelenting, so your defenses should be too. Avast BreachGuard continuously monitors ...

Read more
Browser

How to Protect Yourself From Identity Theft

Identity thieves are on the prowl. Their cause is unrelenting, so your defenses should be too. Avast BreachGuard ...

Identity Theft - Thumbnail
Other Threats

The Ultimate Guide to Identity Theft

Identity theft is a serious crime that affects millions of people every year — often more than once. Our ultimate guide will help you define identity theft, teach you everything you need to know to avoid it, and show you how a strong privacy tool ...

Read more
Other Threats

The Ultimate Guide to Identity Theft

Identity theft is a serious crime that affects millions of people every year — often more than once. Our ultimate guide ...

Other Threats

What Is Social Engineering and How to Prevent It

In any security chain, humans are the generally the weakest link. While machines can be tricked, people are highly susceptible to ...

Read more
Other Threats

What Is Social Engineering and How to Prevent It

In any security chain, humans are the generally the weakest link. While machines can be tricked, people are highly ...

Other Threats

How to Report Online Scams and Fraud

Falling victim to an online scam can be harmful and embarrassing, but allowing the shame to keep you silent is even worse. Learning how to report scams (and where to report them) helps keep the internet safer, while making it more likely your ...

Read more
Other Threats

How to Report Online Scams and Fraud

Falling victim to an online scam can be harmful and embarrassing, but allowing the shame to keep you silent is even ...

Spoofing-Thumb
Other Threats

What is Spoofing and How Can I Defend Against it?

Spoofing is when a hacker pretends to be someone known by a person or network in order to access sensitive information, often for ...

Read more
Other Threats

What is Spoofing and How Can I Defend Against it?

Spoofing is when a hacker pretends to be someone known by a person or network in order to access sensitive information, ...

Cerber_ransomware-Thumb
Ransomware

Cerber Ransomware: Everything You Need to Know

The last thing you need when booting up your computer is some cybercriminal kidnapping your valued files and extorting you for a ...

Read more
Ransomware

Cerber Ransomware: Everything You Need to Know

The last thing you need when booting up your computer is some cybercriminal kidnapping your valued files and extorting ...