academy
Security
Security
See all Security articles
Privacy
Privacy
See all Privacy articles
Performance
Performance
See all Performance articles
Select language
Select language

Social Media

Spoofing-Thumb
Other Threats

What Is Spoofing and How Can I Prevent it?

Picture this: You receive an urgent email from your bank with a link, and you click it — just like that, you’ve become the victim of a ...

Read more
Other Threats

What Is Spoofing and How Can I Prevent it?

Picture this: You receive an urgent email from your bank with a link, and you click ...

Browser

Is Snapchat Safe for Kids? A Parents’ Guide to Snapchat

Social media is everywhere, with new apps launching all the time. It can be overwhelming, particularly if you’re trying to protect ...

Read more
Browser

Is Snapchat Safe for Kids? A Parents’ Guide to Snapchat

Social media is everywhere, with new apps launching all the time. It can be ...

Business

How to Keep Your Facebook Business Page Secure

When running a business, it’s crucial you keep all your pages secure – from point of sale to social media accounts. Protecting your ...

Read more
Business

How to Keep Your Facebook Business Page Secure

When running a business, it’s crucial you keep all your pages secure – from point of ...

Browser

How to Set Parental Controls on a Mac

Mac parental controls are easy to set up and help you monitor screen time, block websites, and limit access to inappropriate content and personal photos. In this guide, you’ll learn how to quickly make your iMac or MacBook kid-safe. For even greater ...

Read more
Browser

How to Set Parental Controls on a Mac

Mac parental controls are easy to set up and help you monitor screen time, block ...

Other Threats

How to Identify and Prevent Apple ID Phishing Scams

Has an Apple phishing email ever slipped into your inbox? If the message asked for payment information or pressured you to click on a ...

Read more
Other Threats

How to Identify and Prevent Apple ID Phishing Scams

Has an Apple phishing email ever slipped into your inbox? If the message asked for ...

Browser

How to Protect Yourself From Identity Theft

Identity thieves are on the prowl. Their cause is unrelenting, so your defenses should be too. Avast BreachGuard continuously monitors ...

Read more
Browser

How to Protect Yourself From Identity Theft

Identity thieves are on the prowl. Their cause is unrelenting, so your defenses ...

Browser

How to Download Your Data From Facebook

Facebook is one of the most popular social media platforms in the world. But few of Facebook’s 2.6 billion users know what Facebook does with their data. Read on to learn how to download your Facebook data, how to see what the social media giant ...

Read more
Browser

How to Download Your Data From Facebook

Facebook is one of the most popular social media platforms in the world. But few of ...

Identity Theft - Thumbnail
Other Threats

The Ultimate Guide to Identity Theft

Identity theft is a serious crime that affects millions of people every year — often more than once. Our ultimate guide will help you define identity theft, teach you everything you need to know to avoid it, and show you how a strong privacy and ...

Read more
Other Threats

The Ultimate Guide to Identity Theft

Identity theft is a serious crime that affects millions of people every year — often ...

Other Threats

Data Brokers: Everything You Need to Know

You may not know who data brokers are, but they know you. Thousands of data brokers buy and sell consumer data every day, collecting a staggering amount of information about everyone, including you. Read on to learn about the companies that sell ...

Read more
Other Threats

Data Brokers: Everything You Need to Know

You may not know who data brokers are, but they know you. Thousands of data brokers ...

Other Threats

What Is Social Engineering and How to Prevent It

In any security chain, humans are generally the weakest link. While machines can be tricked, people are susceptible to falling for all ...

Read more
Other Threats

What Is Social Engineering and How to Prevent It

In any security chain, humans are generally the weakest link. While machines can be ...