academy
Security
Privacy
Performance
Select language

Email

Whether business or personal, your email account needs protection from scammers trying to steal your data or money. Learn how to detect phishing messages and stay secure.

Browser

How to Download Your Google Data

You probably know that Google tracks and collects data about you. But did you know that you can make a Google data request to download Google data? You can use Google to download all the data they have on you, or just some of it. Learn what data the ...

Read more
Browser

How to Download Your Google Data

You probably know that Google tracks and collects data about you. But did you know that you can make a Google data ...

VPN

How to Send an Anonymous Email

Want to go anonymous online? You'll need more than just an incognito browser — you'll need an untraceable email address sent from a secure network, like Avast SecureLine VPN. An anonymous email address done right hides your true identity. From ...

Read more
VPN

How to Send an Anonymous Email

Want to go anonymous online? You'll need more than just an incognito browser — you'll need an untraceable email address ...

Browser

How to Protect Yourself From Identity Theft

Identity thieves are on the prowl. Their cause is unrelenting, so your defenses should be too. Avast BreachGuard continuously monitors ...

Read more
Browser

How to Protect Yourself From Identity Theft

Identity thieves are on the prowl. Their cause is unrelenting, so your defenses should be too. Avast BreachGuard ...

Identity_theft-Thumb
Other Threats

The Ultimate Guide to Identity Theft

Identity theft is a serious crime, affecting millions of people every year — often more than once. Our ultimate guide will help you define identity theft, teach you everything you need to know to avoid it, and show you how a strong privacy tool like ...

Read more
Other Threats

The Ultimate Guide to Identity Theft

Identity theft is a serious crime, affecting millions of people every year — often more than once. Our ultimate guide ...

Other Threats

What Is Social Engineering and How to Prevent It

In any security chain, humans are the generally the weakest link. While machines can be tricked, people are highly susceptible to ...

Read more
Other Threats

What Is Social Engineering and How to Prevent It

In any security chain, humans are the generally the weakest link. While machines can be tricked, people are highly ...

Other Threats

How to Report Online Scams and Fraud

Falling victim to an online scam can be harmful and embarrassing, but allowing the shame to keep you silent is even worse. Learning how to report scams (and where to report them) helps keep the internet safer, while making it more likely your ...

Read more
Other Threats

How to Report Online Scams and Fraud

Falling victim to an online scam can be harmful and embarrassing, but allowing the shame to keep you silent is even ...

Spoofing-Thumb
Other Threats

What is Spoofing and How Can I Defend Against it?

Spoofing is when a hacker pretends to be someone known by a person or network in order to access sensitive information, often in ...

Read more
Other Threats

What is Spoofing and How Can I Defend Against it?

Spoofing is when a hacker pretends to be someone known by a person or network in order to access sensitive information, ...

Cerber_ransomware-Thumb
Ransomware

Cerber Ransomware: Everything You Need to Know

The last thing you need when booting up your computer is some cybercriminal kidnapping your valued files and extorting you for a ...

Read more
Ransomware

Cerber Ransomware: Everything You Need to Know

The last thing you need when booting up your computer is some cybercriminal kidnapping your valued files and extorting ...

Other Threats

What is Cybercrime and How Can You Prevent It?

The bane of the internet, cybercrime refers to any and all illegal activities carried out using technology. Cybercriminals — who range ...

Read more
Other Threats

What is Cybercrime and How Can You Prevent It?

The bane of the internet, cybercrime refers to any and all illegal activities carried out using technology. ...

Scam-Thumb
Other Threats

What is a Scam: The Essential Guide to Staying Scam-Free

A scam is a fraudulent attempt to obtain something of value from you, typically money but not always. In this article, we break down ...

Read more
Other Threats

What is a Scam: The Essential Guide to Staying Scam-Free

A scam is a fraudulent attempt to obtain something of value from you, typically money but not always. In this article, ...