academy
Security
Security
See all Security articles
Privacy
Privacy
See all Privacy articles
Performance
Performance
See all Performance articles
Select language
Select language

Email

Whether business or personal, your email account needs protection from scammers trying to steal your data or money. Learn how to detect phishing messages and stay secure.

Other Threats

How to Report Identity Theft

Identity theft is on the rise — and becoming a victim can leave your bank account empty, your credit wrecked, and your chances of getting a loan in ruins. That’s why reporting a stolen identity immediately is so important. Keep reading to learn how ...

Read more
Other Threats

How to Report Identity Theft

Identity theft is on the rise — and becoming a victim can leave your bank account ...

Passwords

How to Create a Strong Password

The best password is a strong password, but you’re not alone if you’re struggling to come up with good password ideas. An uncrackable password keeps hackers out while safeguarding all your accounts and personal data. Learn how to create a strong ...

Read more
Passwords

How to Create a Strong Password

The best password is a strong password, but you’re not alone if you’re struggling to ...

Other Threats

Spear Phishing: What Is It and How Can You Avoid It?

Think you can spot a scam? Spear phishing attacks are devilishly deceptive. Designed to look like legitimate emails, spear phishing ...

Read more
Other Threats

Spear Phishing: What Is It and How Can You Avoid It?

Think you can spot a scam? Spear phishing attacks are devilishly deceptive. Designed ...

Other Threats

How to Identify & Prevent Tech Support Scams

Ever worry about computer scams tricking you or your loved ones? Ever had someone shady contact you offering technical support? A tech ...

Read more
Other Threats

How to Identify & Prevent Tech Support Scams

Ever worry about computer scams tricking you or your loved ones? Ever had someone ...

Spoofing-Thumb
Other Threats

What Is Spoofing and How Can I Prevent it?

Picture this: You receive an urgent email from your bank with a link, and you click it — just like that, you’ve become the victim of a ...

Read more
Other Threats

What Is Spoofing and How Can I Prevent it?

Picture this: You receive an urgent email from your bank with a link, and you click ...

Other Threats

What Is a Brute Force Attack?

The best passwords are long, complex, and avoid using simple names or well-known terms. That’s because short or obvious passwords won’t hold up for long against a brute force attack. But what exactly is a brute force attack? Discover how brute force ...

Read more
Other Threats

What Is a Brute Force Attack?

The best passwords are long, complex, and avoid using simple names or well-known ...

Other Threats

How to Identify and Prevent Apple ID Phishing Scams

Has an Apple phishing email ever slipped into your inbox? If the message asked for payment information or pressured you to click on a ...

Read more
Other Threats

How to Identify and Prevent Apple ID Phishing Scams

Has an Apple phishing email ever slipped into your inbox? If the message asked for ...

Browser

How to Download Your Google Data

You probably know that Google tracks and collects data about you. But did you know that you can make a Google data request to download Google data? You can use Google to download all the data they have on you, or just some of it. Learn what data the ...

Read more
Browser

How to Download Your Google Data

You probably know that Google tracks and collects data about you. But did you know ...

VPN

How to Send an Anonymous Email

Want to go anonymous online? You'll need more than just an incognito browser — you'll need an untraceable email address sent from a secure network, like Avast SecureLine VPN. An anonymous email address done right hides your true identity. From ...

Read more
VPN

How to Send an Anonymous Email

Want to go anonymous online? You'll need more than just an incognito browser — ...

Browser

How to Protect Yourself From Identity Theft

Identity thieves are on the prowl. Their cause is unrelenting, so your defenses should be too. Avast BreachGuard continuously monitors ...

Read more
Browser

How to Protect Yourself From Identity Theft

Identity thieves are on the prowl. Their cause is unrelenting, so your defenses ...