11800062683
Logo Ameba Icon Security Icon Security White Icon Privacy Icon Performance Icon Privacy Icon Security Icon Performance Icons/45/01 Security/Other-Threats Icons / 32 / Bloatware removal Icons / 32 / Registry Cleaner Icons / 32 / CleanUp Icons / Feature / 32 / Mac Icons / 32 / Browser cleanup Icons/32/01 Security/Malware Icons/32/01 Security/Viruses Icons/32/01 Security/Other-Threats Icons/32/01 Security/phishing Icons/32/01 Security/Scams Icons/32/01 Security/hacking Icons/32/01 Security/Security-tips Icons/32/01 Privacy/Privacy-tips Icons/32/01 Performance/Software Icons/32/01 Privacy/Identity-Protection Icons/32/01 Privacy/Digital-life Icons/32/01 Performance/Performance-tips Icons/32/01 Security/Passwords Icons/32/01 Security/Ransomware Icons/32/01 Security/Business Icons/32/02 Privacy/Browser Icons/32/02 Privacy/IP adress Icons/32/02 Privacy/VPN Icons/32/02 Privacy/Proxy Icons/32/02 Privacy/Streaming Icons/32/03 Performance/Celaning Icons/32/03 Performance/Drivers Icons/32/03 Performance/Gaming Icons/32/03 Performance/Hardware Icons/32/03 Performance/Speed Icons / 32 / Bloatware removal Icons / 32 / Registry Cleaner Win Icons / 32 / CleanUp Icons / Feature / 32 / Mac Icons / 32 / Browser cleanup Icons/60/02 Privacy/02_Privacy Icons/60/01 Security/01_Security Icons/60/03 Performance/03_Performance Icons/45/01 Security/phishing Icons/45/01 Security/Scams Icons/45/01 Security/hacking Icons/45/01 Security/Security-tips Icons/45/01 Privacy/Privacy-tips Icons/45/01 Performance/Software Icons/45/01 Privacy/Identity-Protection Icons/45/01 Privacy/Digital-life Icons/45/01 Performance/Performance-tips Icons/80/01 Security/phishing Icons/80/01 Security/Scams Icons/80/01 Security/hacking Icons/80/01 Security/Security-tips Icons/80/01 Privacy/Privacy-tips Icons/80/01 Performance/Software Icons/80/01 Privacy/Identity-Protection Icons/80/01 Privacy/Digital-life Icons/80/01 Performance/Performance-tips Icons/80/01 Security/IoT Icons/80/01 Security/Malware Icons/80/01 Security/Passwords Icons/80/01 Security/Ransomware Icons/80/01 Security/Viruses Icons/80/01 Security/Other-Threats Icons/80/03 Security/Business Icons/80/02 Privacy/Browser Icons/80/02 Privacy/IP adress Icons/80/02 Privacy/VPN Icons/80/02 Privacy/Proxy Icons/80/02 Privacy/Streaming Icons/80/03 Performance/Celaning Icons/80/03 Performance/Drivers Icons/80/03 Performance/Gaming Icons/80/03 Performance/Hardware Icons/80/03 Performance/Speed Icons/80/03 Performance/03_Performance Icons/80/02 Privacy/02_Privacy
Avast
academy
Close
  • For home For home Products for PC and mobile phone protection
  • For business For business Protect your business with Avast
  • For partners For partners Partner with Avast and boost your business
  • About us About us Carriers, investors, media, contact
  • Blogs Academy, Blog, Decoded, Forum
  • Search
  • English
  • Blogs
  • Avast Blog Read about recent news from the security world
  • Avast Academy Best point of reference about cyber attacks
  • Avast Decoded In-depth technical articles regarding security threats
  • Avast Forum Discuss with the community
  • Select region
    • English
    • Čeština
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Polski
    • Português
    • Русский
Academy
  • Security
      • Malware
      • Viruses
      • Ransomware
      • Phishing
      • Scams
      • Hacking
      • Other Threats
      • Passwords
      • Business
      • Security Tips
    See all Security articles
  • Privacy
      • Browser
      • IP Address
      • VPN
      • Streaming
      • Identity Protection
      • Dark Web
      • Digital Life
      • Privacy Tips
    See all Privacy articles
  • Performance
      • Speed
      • Cleaning
      • Gaming
      • Hardware
      • Software
      • Drivers
      • Performance Tips
    See all Performance articles
Avast
academy
  • Security
    • Malware
    • Viruses
    • Ransomware
    • Phishing
    • Scams
    • Hacking
    • Other Threats
    • Passwords
    • Business
    • Security Tips
    See all Security articles
  • Privacy
    • Browser
    • IP Address
    • VPN
    • Streaming
    • Identity Protection
    • Dark Web
    • Digital Life
    • Privacy Tips
    See all Privacy articles
  • Performance
    • Speed
    • Cleaning
    • Gaming
    • Hardware
    • Software
    • Drivers
    • Performance Tips
    See all Performance articles
  • English
    • English
    • Čeština
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Polski
    • Português
    • Русский
academy
Menu
academy
Security
Malware Viruses Ransomware Phishing Scams Hacking Other Threats Passwords Business Security Tips See all Security articles
Privacy
Browser IP Address VPN Streaming Identity Protection Dark Web Digital Life Privacy Tips See all Privacy articles
Performance
Speed Cleaning Gaming Hardware Software Drivers Performance Tips See all Performance articles
English
English Čeština Deutsch Español Français Italiano 日本語 Polski Português Русский

Security

We’ve been fighting viruses since 1988 — so we know how to keep you secure. Learn from our experts and get the skills you need to stay safe against online threats.

Malware
Viruses
Ransomware
Phishing
Scams
Hacking
Other Threats
Passwords
Business
Security Tips
Avast Academy Security

Malware

More About Malware
What Is Malware and How to Protect Against Malware Attacks?
Spyware-Thumb
What Is Spyware, Who Can Be Attacked, and How to Prevent It
What Is Scareware? Detection, Prevention, and Removal
What Is Pegasus Spyware and Is Your Phone Infected with Pegasus?
How to Detect and Remove Spyware From an iPhone
What Is the Mirai Botnet?
Zeus_trojan-Thumb
The Zeus Trojan: What it is, How it Works, and How to Stay Safe
How to Remove a Virus From Your Router
SHOW MORE "MALWARE" ARTICLES

Viruses

More About Viruses
What Is a Computer Virus and How Does It Work?
Can Macs Get Viruses?
Stuxnet: What Is It & How Does It Work?
Macro Virus: What Is It and How to Remove It
Worm vs. Virus: What's the Difference and Does It Matter?
Can_Phones_Get_a_Virus-Thumb
Can Your iPhone or Android Phone Get a Virus?
SHOW MORE "VIRUSES" ARTICLES

Ransomware

More About Ransomware
The Essential Guide to Ransomware
How_to_prevent_ransomnware-Thumb
How to Prevent Ransomware
What Is Ryuk Ransomware?
The Destructive Reality of Ransomware Attacks
How to Remove Ransomware from Android Devices
How to Remove Ransomware from Your iPhone or iPad
SHOW MORE "RANSOMWARE" ARTICLES

Phishing

More About Phishing
How to Spot and Prevent IP Spoofing
How to Spot Amazon Phishing Emails and Beat Scammers
Pharming-Thumb
What Is Pharming and How to Protect Against It
Spear Phishing: What Is It and How Can You Avoid It?
What Is Phone Number Spoofing and How to Stop It
Spoofing-Thumb
What Is Spoofing and How Can I Prevent it?
SHOW MORE "PHISHING" ARTICLES

Scams

More About Scams
How to Avoid Common Venmo Scams & Stay Safe Online
10 Cash App Scams: How to Spot the Signs and Send Money Safely
What Is a SIM Swap Attack and How Can You Prevent It?
How to Identify a Fake Text Message: Tips and Examples
How to Block Spam Calls on Your Phone
How to Avoid Amazon Scams
SHOW MORE "SCAMS" ARTICLES

Hacking

More About Hacking
What Is an Evil Twin Attack and How Does It Work?
Has My Amazon Account Been Hacked?
Can Someone Hack Your Phone by Calling or Texting You?
Packet Sniffing Explained: Definition, Types, and Protection
Has My PayPal Account Been Hacked?
What to Do If Your Spotify Account Gets Hacked
SHOW MORE "HACKING" ARTICLES

Other Threats

More About Other Threats
Has My Twitter Account Been Hacked?
What Is a Security Breach?
A Guide to APKPure: Is It Legal and Is It Safe?
Cyber Warfare: Types, Examples, and How to Stay Safe
What Is a Decentralized Autonomous Organization (DAO)?
How to Find Out an Unknown Caller’s Number
SHOW MORE "OTHER THREATS" ARTICLES

Passwords

More About Passwords
How to View Saved Passwords in Chrome: Step-by-Step Guide
How Does Two-Factor Authentication (2FA) Work?
How_to_Password_Protect_a_File_or_Folder_in_Windows-Thumb
Step-by-Step Guide to Password Protect a File or Folder in Windows
How to Choose the Best Password Manager
How to Create a Strong Password
The Top Password Cracking Techniques Used by Hackers
SHOW MORE "PASSWORDS" ARTICLES

Business

More About Business
What is cybersecurity?
IT Disaster Recovery Plans
What Is a Wildcard Certificate and How Does It Work?
Business Continuity Plan (BCP): What Is It and How to Make One
OPSEC: What Is It and How Does It Work?
What Is the Cyber Kill Chain and How Does It Work?
SHOW MORE "BUSINESS" ARTICLES

Security Tips

More About Security Tips
TLS Explained: What Is Transport Layer Security and How Does It Work?
NFTs for Beginners: How to Make Your Own NFT
What Is Rooting? The Risks of Rooting Your Android Device
What Is Jailbreaking and Is It Safe?
How to Find a Lost or Stolen Android Phone
The Best Internet Security Software in 2024
SHOW MORE "SECURITY TIPS" ARTICLES

Tags

MOBILE DESKTOP SOCIAL MEDIA IOS ANDROID WINDOWS MAC EMAIL

What's New on Avast Academy

Security
Privacy
Performance
  • What Is an Evil Twin Attack and How Does It Work?
  • Has My Twitter Account Been Hacked?
  • TLS Explained: What Is Transport Layer Security and How Does It Work?
  • How to Avoid Common Venmo Scams & Stay Safe Online
  • 10 Cash App Scams: How to Spot the Signs and Send Money Safely
  • NFTs for Beginners: How to Make Your Own NFT
  • What Is a Security Breach?
  • A Guide to APKPure: Is It Legal and Is It Safe?
  • Has My Amazon Account Been Hacked?
  • Can Someone Hack Your Phone by Calling or Texting You?
  • TikTok: How to Delete or Deactivate Your Account
  • Dark Web Facts Revealed: Myths and Stats About the Secret Web
  • How to Stop Pop-Up Ads on Android
  • VPN Protocols Explained and Compared
  • What Is the about:blank Page? How to Use or Remove It
  • What Is Yubo, Is It a Dating App, and What Do Parents Need to Know?
  • What Is a CVV Number and How Do I Find It?
  • The Fastest Browsers to Use in 2024
  • How to Stream Your Favorite TV Shows With a VPN
  • What Is Doxxing, Is Doxxing Illegal, and How Do You Prevent or Report It?
  • How to Fix Common Printer Problems
  • How Do I Know What Type of Motherboard I Have?
  • Why Does My Phone Keep Restarting and How Can I Fix It?
  • How to Check and Monitor Your CPU Temperature
  • SSD vs. HDD: Which Do You Need?
  • How to Update Graphics Drivers in Windows 10, 8, and 7
  • Why Is My Browser So Slow? How to Speed Up Chrome, Firefox, and IE
  • Mac Running Slow? 15 Proven Solutions to Speed Up Your Mac
  • How to Show Hidden Files on a Mac
  • 7 Reasons Why Your Internet Isn’t Working

Free Security Tools

  • Free Rootkit Scanner and Removal Tool
  • Free Trojan Scanner and Removal Tool
  • Internet Security Software
  • Free Virus Scanner and Removal Tool
  • Free Anti-Ransomware Protection & Removal Tool
  • Free Adware Scanner and Cleaner Tool
  • Free Malware Scanner and Removal Tool
  • Free Anti-Spyware Scanner and Remover
Security
19-01-2016

For Home

  • Support
  • Security
  • Privacy
  • Performance
  • Blog
  • Forum

For Business

  • Business support
  • Business products
  • Business partners
  • Business blog
  • Affiliates

For Partners

  • Mobile Carriers

Company

  • Contact Us
  • Investors
  • Careers
  • Press Center
  • Responsibility
  • Technology
  • Research Participation
1988-2023 Copyright Avast Software s.r.o.
  • Privacy policy
  • Legal
  • Report vulnerability
  • Contact security
  • Modern Slavery Statement
  • Do not sell my info
  • Cookie Preferences