academy
Security
Security
See all Security articles
Privacy
Privacy
See all Privacy articles
Performance
Performance
See all Performance articles
Select language
Select language

Social Media

Social media networks are an integral part of our digital lives. Learn how to maximize your privacy on the networks you use and how to keep yourself and your relatives secure.

Internet of Things

Is Alexa Always Listening? How to Protect Your Privacy

If you have a smart device with Amazon Alexa, you may wonder whether Alexa listens to everything you say, if it spies on you, and what ...

Read more
Internet of Things

Is Alexa Always Listening? How to Protect Your Privacy

If you have a smart device with Amazon Alexa, you may wonder whether Alexa listens to everything you say, if it spies on ...

Other Threats

What Is Phone Number Spoofing and How to Stop It

Phone number spoofing to disguise caller IDs is a growing phenomenon, and the problem isn’t limited to the receiving end of spoofed ...

Read more
Other Threats

What Is Phone Number Spoofing and How to Stop It

Phone number spoofing to disguise caller IDs is a growing phenomenon, and the problem isn’t limited to the receiving end ...

Browser

Is Snapchat Safe for Kids? A Parents’ Guide to Snapchat

Social media is everywhere, with new apps launching all the time. It can be overwhelming, particularly if you’re trying to protect ...

Read more
Browser

Is Snapchat Safe for Kids? A Parents’ Guide to Snapchat

Social media is everywhere, with new apps launching all the time. It can be overwhelming, particularly if you’re trying ...

Business

How to Keep Your Facebook Business Page Secure

When running a business, it’s crucial you keep all your pages secure – from point of sale to social media accounts. Protecting your ...

Read more
Business

How to Keep Your Facebook Business Page Secure

When running a business, it’s crucial you keep all your pages secure – from point of sale to social media accounts. ...

Browser

How to Set Parental Controls on a Mac

Mac parental controls are easy to set up and help you monitor screen time, block websites, and limit access to inappropriate content and personal photos. In this guide, you’ll learn how to quickly make your iMac or MacBook kid-safe. For even greater ...

Read more
Browser

How to Set Parental Controls on a Mac

Mac parental controls are easy to set up and help you monitor screen time, block websites, and limit access to ...

Other Threats

How to Identify and Prevent Apple ID Phishing Scams

Has an Apple phishing email ever slipped into your inbox? If the message asked for payment information or pressured you to click on a ...

Read more
Other Threats

How to Identify and Prevent Apple ID Phishing Scams

Has an Apple phishing email ever slipped into your inbox? If the message asked for payment information or pressured you ...

Browser

How to Protect Yourself From Identity Theft

Identity thieves are on the prowl. Their cause is unrelenting, so your defenses should be too. Avast BreachGuard continuously monitors ...

Read more
Browser

How to Protect Yourself From Identity Theft

Identity thieves are on the prowl. Their cause is unrelenting, so your defenses should be too. Avast BreachGuard ...

Browser

How to Download Your Data From Facebook

Facebook is one of the most popular social media platforms in the world. But few of Facebook’s 2.6 billion users know what Facebook does with their data. Read on to learn how to download your Facebook data, how to see what the social media giant ...

Read more
Browser

How to Download Your Data From Facebook

Facebook is one of the most popular social media platforms in the world. But few of Facebook’s 2.6 billion users know ...

Identity Theft - Thumbnail
Other Threats

The Ultimate Guide to Identity Theft

Identity theft is a serious crime that affects millions of people every year — often more than once. Our ultimate guide will help you define identity theft, teach you everything you need to know to avoid it, and show you how a strong privacy tool ...

Read more
Other Threats

The Ultimate Guide to Identity Theft

Identity theft is a serious crime that affects millions of people every year — often more than once. Our ultimate guide ...

Other Threats

Data Brokers: Everything You Need to Know

You may not know who data brokers are, but they know you. Thousands of data brokers buy and sell consumer data every day, collecting a staggering amount of information about everyone, including you. Read on to learn about the companies that sell ...

Read more
Other Threats

Data Brokers: Everything You Need to Know

You may not know who data brokers are, but they know you. Thousands of data brokers buy and sell consumer data every ...