academy
Security
Security
See all Security articles
Privacy
Privacy
See all Privacy articles
Performance
Performance
See all Performance articles
Select language
Select language

Mobile

Rootkit-Thumb
Malware

What Is a Rootkit and How to Remove It?

A rootkit is a stealthy and dangerous type of malware that lets hackers access your computer without your knowledge. Thankfully, even these nearly-invisible bits of software can be found and removed. Learn about the different types of rootkits, how ...

Read more
Malware

What Is a Rootkit and How to Remove It?

A rootkit is a stealthy and dangerous type of malware that lets hackers access your computer ...

Other Threats

How to Identify & Prevent Tech Support Scams

Ever worry about computer scams tricking you or your loved ones? Ever had someone shady contact you offering technical support? A tech ...

Read more
Other Threats

How to Identify & Prevent Tech Support Scams

Ever worry about computer scams tricking you or your loved ones? Ever had someone shady ...

Browser

How to View and Delete Incognito History

Have you ever wondered if your incognito history gets saved anywhere? While browsing incognito prevents your browsing history from being stored on your device, your online activity might not be gone forever after you end your session. Learn how to ...

Read more
Browser

How to View and Delete Incognito History

Have you ever wondered if your incognito history gets saved anywhere? While browsing incognito ...

Browser

How to Allow and Block Pop-Ups in Firefox

While some pop-ups in Firefox are helpful, the majority are distracting and can even introduce security risks. Learn how to use pop-up blockers in the Firefox settings, then find out how the specialized Avast Secure Browser can block unwanted ...

Read more
Browser

How to Allow and Block Pop-Ups in Firefox

While some pop-ups in Firefox are helpful, the majority are distracting and can even introduce ...

Browser

The Best Free Encryption Software to Protect Your Data

No matter how careful you are, your personal information is never fully protected. But encryption software can make sure your personal ...

Read more
Browser

The Best Free Encryption Software to Protect Your Data

No matter how careful you are, your personal information is never fully protected. But ...

VPN

How to Check If Your VPN Is Working

Is your new VPN leaking your data or giving an unreliable connection? We’ll show you how to perform a VPN test and check if your VPN is working properly to hide your IP address and protect your info. Then, find out why it’s important to protect ...

Read more
VPN

How to Check If Your VPN Is Working

Is your new VPN leaking your data or giving an unreliable connection? We’ll show you how to ...

Browser

Is Snapchat Safe for Kids? A Parents’ Guide to Snapchat

Social media is everywhere, with new apps launching all the time. It can be overwhelming, particularly if you’re trying to protect ...

Read more
Browser

Is Snapchat Safe for Kids? A Parents’ Guide to Snapchat

Social media is everywhere, with new apps launching all the time. It can be overwhelming, ...

Malware

What Is Malvertising and How Do I Stop it?

Malvertising attacks use infected ads to spread malware or send you to malicious websites — often, you don’t even need to click on the ...

Read more
Malware

What Is Malvertising and How Do I Stop it?

Malvertising attacks use infected ads to spread malware or send you to malicious websites — ...

VPN

Data Encryption: What Is It?

Data encryption is the act of encoding sensitive data and personal information to protect it against access by unauthorized parties — like cybercriminals. Here, we’ll explore what encryption is, how it works, and how it can protect you against ...

Read more
VPN

Data Encryption: What Is It?

Data encryption is the act of encoding sensitive data and personal information to protect it ...

Malware

What Is a Logic Bomb? How to Prevent Logic Bomb Attacks

Logic bombs are subtle, sophisticated cybersecurity attacks — but the damage can be explosive. This article will define logic bombs, ...

Read more
Malware

What Is a Logic Bomb? How to Prevent Logic Bomb Attacks

Logic bombs are subtle, sophisticated cybersecurity attacks — but the damage can be explosive. ...