academy
Security
Security
See all Security articles
Privacy
Privacy
See all Privacy articles
Performance
Performance
See all Performance articles
Select language
Select language

Email

Whether business or personal, your email account needs protection from scammers trying to steal your data or money. Learn how to detect phishing messages and stay secure.

Other Threats

Spear Phishing: What Is It and How Can You Avoid It?

Think you can spot a scam? Spear phishing attacks are devilishly deceptive. Designed to look like legitimate emails, spear phishing ...

Read more
Other Threats

Spear Phishing: What Is It and How Can You Avoid It?

Think you can spot a scam? Spear phishing attacks are devilishly deceptive. Designed to look like legitimate emails, ...

Other Threats

How to Identify & Prevent Tech Support Scams

Ever worry about computer scams tricking you or your loved ones? Ever had someone shady contact you offering technical support? A tech ...

Read more
Other Threats

How to Identify & Prevent Tech Support Scams

Ever worry about computer scams tricking you or your loved ones? Ever had someone shady contact you offering technical ...

Spoofing-Thumb
Other Threats

What Is Spoofing and How Can I Prevent it?

Picture this: You receive an urgent email from your bank with a link, and you click it — just like that, you’ve become the victim of a ...

Read more
Other Threats

What Is Spoofing and How Can I Prevent it?

Picture this: You receive an urgent email from your bank with a link, and you click it — just like that, you’ve become ...

Other Threats

What Is a Brute Force Attack?

The best passwords are long, complex, and avoid using simple names or well-known terms. That’s because short or obvious passwords won’t hold up for long against a brute force attack. But what exactly is a brute force attack? Discover how brute force ...

Read more
Other Threats

What Is a Brute Force Attack?

The best passwords are long, complex, and avoid using simple names or well-known terms. That’s because short or obvious ...

Other Threats

How to Identify and Prevent Apple ID Phishing Scams

Has an Apple phishing email ever slipped into your inbox? If the message asked for payment information or pressured you to click on a ...

Read more
Other Threats

How to Identify and Prevent Apple ID Phishing Scams

Has an Apple phishing email ever slipped into your inbox? If the message asked for payment information or pressured you ...

Browser

How to Download Your Google Data

You probably know that Google tracks and collects data about you. But did you know that you can make a Google data request to download Google data? You can use Google to download all the data they have on you, or just some of it. Learn what data the ...

Read more
Browser

How to Download Your Google Data

You probably know that Google tracks and collects data about you. But did you know that you can make a Google data ...

VPN

How to Send an Anonymous Email

Want to go anonymous online? You'll need more than just an incognito browser — you'll need an untraceable email address sent from a secure network, like Avast SecureLine VPN. An anonymous email address done right hides your true identity. From ...

Read more
VPN

How to Send an Anonymous Email

Want to go anonymous online? You'll need more than just an incognito browser — you'll need an untraceable email address ...

Browser

How to Protect Yourself From Identity Theft

Identity thieves are on the prowl. Their cause is unrelenting, so your defenses should be too. Avast BreachGuard continuously monitors ...

Read more
Browser

How to Protect Yourself From Identity Theft

Identity thieves are on the prowl. Their cause is unrelenting, so your defenses should be too. Avast BreachGuard ...

Identity Theft - Thumbnail
Other Threats

The Ultimate Guide to Identity Theft

Identity theft is a serious crime that affects millions of people every year — often more than once. Our ultimate guide will help you define identity theft, teach you everything you need to know to avoid it, and show you how a strong privacy tool ...

Read more
Other Threats

The Ultimate Guide to Identity Theft

Identity theft is a serious crime that affects millions of people every year — often more than once. Our ultimate guide ...

Other Threats

What Is Social Engineering and How to Prevent It

In any security chain, humans are generally the weakest link. While machines can be tricked, people are highly susceptible to falling ...

Read more
Other Threats

What Is Social Engineering and How to Prevent It

In any security chain, humans are generally the weakest link. While machines can be tricked, people are highly ...