close
12263008279
Logo Ameba Icon Security Icon Security White Icon Privacy Icon Performance Icon Privacy Icon Security Icon Performance Icons/45/01 Security/Other-Threats Icons / 32 / Bloatware removal Icons / 32 / Registry Cleaner Icons / 32 / CleanUp Icons / Feature / 32 / Mac Icons / 32 / Browser cleanup Icons/32/01 Security/Malware Icons/32/01 Security/Viruses Icons/32/01 Security/Other-Threats Icons/32/01 Security/phishing Icons/32/01 Security/Scams Icons/32/01 Security/hacking Icons/32/01 Security/Security-tips Icons/32/01 Privacy/Privacy-tips Icons/32/01 Performance/Software Icons/32/01 Privacy/Identity-Protection Icons/32/01 Privacy/Digital-life Icons/32/01 Performance/Performance-tips Icons/32/01 Security/Passwords Icons/32/01 Security/Ransomware Icons/32/01 Security/Business Icons/32/02 Privacy/Browser Icons/32/02 Privacy/IP adress Icons/32/02 Privacy/VPN Icons/32/02 Privacy/Proxy Icons/32/02 Privacy/Streaming Icons/32/03 Performance/Celaning Icons/32/03 Performance/Drivers Icons/32/03 Performance/Gaming Icons/32/03 Performance/Hardware Icons/32/03 Performance/Speed Icons / 32 / Bloatware removal Icons / 32 / Registry Cleaner Icons / 32 / CleanUp Icons / Feature / 32 / Mac Icons / 32 / Browser cleanup Icons/60/02 Privacy/02_Privacy Icons/60/01 Security/01_Security Icons/60/03 Performance/03_Performance Icons/45/01 Security/phishing Icons/45/01 Security/Scams Icons/45/01 Security/hacking Icons/45/01 Security/Security-tips Icons/45/01 Privacy/Privacy-tips Icons/45/01 Performance/Software Icons/45/01 Privacy/Identity-Protection Icons/45/01 Privacy/Digital-life Icons/45/01 Performance/Performance-tips Icons/80/01 Security/phishing Icons/80/01 Security/Scams Icons/80/01 Security/hacking Icons/80/01 Security/Security-tips Icons/80/01 Privacy/Privacy-tips Icons/80/01 Performance/Software Icons/80/01 Privacy/Identity-Protection Icons/80/01 Privacy/Digital-life Icons/80/01 Performance/Performance-tips Icons/80/01 Security/IoT Icons/80/01 Security/Malware Icons/80/01 Security/Passwords Icons/80/01 Security/Ransomware Icons/80/01 Security/Viruses Icons/80/01 Security/Other-Threats Icons/80/03 Security/Business Icons/80/02 Privacy/Browser Icons/80/02 Privacy/IP adress Icons/80/02 Privacy/VPN Icons/80/02 Privacy/Proxy Icons/80/02 Privacy/Streaming Icons/80/03 Performance/Celaning Icons/80/03 Performance/Drivers Icons/80/03 Performance/Gaming Icons/80/03 Performance/Hardware Icons/80/03 Performance/Speed Icons/80/03 Performance/03_Performance Icons/80/02 Privacy/02_Privacy
academy
Close
  • For home For home Products for PC and mobile phone protection
  • For business For business Protect your business with Avast
  • For partners For partners Partner with Avast and boost your business
  • About us About us Carriers, investors, media, contact
  • Blogs Academy, Blog, Decoded, Forum
  • Search
  • English
  • Blogs
  • Avast Blog Read about recent news from the security world
  • Avast Academy Best point of reference about cyber attacks
  • Avast Decoded In-depth technical articles regarding security threats
  • Avast Forum Discuss with the community
  • Select region
    • English
    • Čeština
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Polski
    • Português
    • Русский
Academy
  • Security
      • Malware
      • Viruses
      • Ransomware
      • Phishing
      • Scams
      • Hacking
      • Other Threats
      • Passwords
      • Business
      • Security Tips
    See all Security articles
  • Privacy
      • Browser
      • IP Address
      • VPN
      • Streaming
      • Identity Protection
      • Dark Web
      • Digital Life
      • Privacy Tips
    See all Privacy articles
  • Performance
      • Speed
      • Cleaning
      • Gaming
      • Hardware
      • Software
      • Drivers
      • Performance Tips
    See all Performance articles
academy
  • Security
    • Malware
    • Viruses
    • Ransomware
    • Phishing
    • Scams
    • Hacking
    • Other Threats
    • Passwords
    • Business
    • Security Tips
    See all Security articles
  • Privacy
    • Browser
    • IP Address
    • VPN
    • Streaming
    • Identity Protection
    • Dark Web
    • Digital Life
    • Privacy Tips
    See all Privacy articles
  • Performance
    • Speed
    • Cleaning
    • Gaming
    • Hardware
    • Software
    • Drivers
    • Performance Tips
    See all Performance articles
  • English
    • English
    • Čeština
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Polski
    • Português
    • Русский
academy
Menu
academy
Security
Malware Viruses Ransomware Phishing Scams Hacking Other Threats Passwords Business Security Tips See all Security articles
Privacy
Browser IP Address VPN Streaming Identity Protection Dark Web Digital Life Privacy Tips See all Privacy articles
Performance
Speed Cleaning Gaming Hardware Software Drivers Performance Tips See all Performance articles
English
English Čeština Deutsch Español Français Italiano 日本語 Polski Português Русский

Avast Academy

Avast prevents 1.5 billion cyber attacks per month. And in our free time, we love teaching the world about digital security, online privacy, and device performance. See all of our guides, tips, and advice right here.

Security
  • Malware
  • Viruses
  • Ransomware
  • Phishing
  • Scams
  • Hacking
  • Other Threats
  • Passwords
  • Business
  • Security Tips
Privacy
  • Browser
  • IP Address
  • VPN
  • Streaming
  • Identity Protection
  • Dark Web
  • Digital Life
  • Privacy Tips
Performance
  • Speed
  • Cleaning
  • Gaming
  • Hardware
  • Software
  • Drivers
  • Performance Tips
Security
Privacy
Performance
  • Malware
  • Viruses
  • Ransomware
  • Phishing
  • Scams
  • Hacking
  • Other Threats
  • Passwords
  • Business
  • Security Tips
  • Browser
  • IP Address
  • VPN
  • Streaming
  • Identity Protection
  • Dark Web
  • Digital Life
  • Privacy Tips
  • Speed
  • Cleaning
  • Gaming
  • Hardware
  • Software
  • Drivers
  • Performance Tips

Tags

DESKTOP MOBILE WINDOWS MAC IOS ANDROID

Security

Malware

Image
What Is Malware and How to Protect Against Malware Attacks?
Image
What is fileless malware, and how can you help prevent it?
More About Malware

Viruses

Image
What Is a Computer Virus and How Does It Work?
Image
How to Check for Viruses on iPhone
More About Viruses

Ransomware

Image
What Is Ransomware and How to Prevent It
Image
What Is Ryuk Ransomware?
More About Ransomware

Phishing

Image
What Is Smishing and How to Avoid It
Image
What Is Vishing? Definition, Attack Methods & Prevention
More About Phishing

Scams

Image
Brushing Scams: What Are They and How Do They Work?
A Nigerian prince wearing a gold crown and surrounded by coins.
What is the Nigerian Prince scam?
More About Scams

Hacking

Image
What is a dictionary attack?
Image
What is a script kiddie?
More About Hacking

Other Threats

Image
Is BlueStacks safe?
Image
What Is Riskware and How to Avoid It
More About Other Threats

Passwords

Image
Credential Stuffing: What It Is and How To Prevent It
Image
How to View Saved Passwords in Chrome: Step-by-Step Guide
More About Passwords

Business

Image
What Are Intrusion Detection Systems (IDS) and How Do They Work
Image
What is SOC 2? Your Guide to SOC Certification and Compliance
More About Business

Security Tips

Image
New Avast One vs Legacy Avast One: What’s Changed?
Image
What Is the New Avast One?
More About Security Tips
Show more Security articles

Privacy

Browser

Image
How to Clear Your Browsing and Search History
Image
Six New Ways Avast Secure Browser Helps Keep You Safe, Private, and in Control
More About Browser

IP Address

Image
What is an IP Address?
Image
TCP vs UDP: What’s the Difference and Which Protocol Is Better?
More About IP Address

VPN

Image
What Is a VPN and How Does It Work?
Image
What is a Proxy Server and How Does it Work?
More About VPN

Streaming

Image
What is Internet Streaming and How Does it Work?
Image
How to Block Twitch Ads: Ad Blocker, VPN, and Twitch Turbo
More About Streaming

Identity Protection

Image
How to Prevent Elder Financial Abuse
Image
What to do if you lose your wallet
More About Identity Protection

Dark Web

Image
Dark Web Facts Revealed: Myths and Stats About the Secret Web
Image
Dark Web Links: The Best Onion and Tor Sites in 2026
More About Dark Web

Digital Life

Is_this_website_safe-Your_complete_website_safety_check_guide-Thumb
Is This Website Safe? Your Complete Website Safety Check Guide
Image
What Is VoIP and How Does It Work?
More About Digital Life

Privacy Tips

Image
How to Find Hidden Apps on Android
Image
How to turn off Meta AI
More About Privacy Tips
Show more Privacy articles

Performance

Speed

How_to_Speed_Up_Your_PC-Thumb
How to Speed Up Your PC
Image
Why Is My Browser So Slow? How to Speed Up Chrome, Firefox, and IE
More About Speed

Cleaning

Image
How to Clear the Instagram Cache on Your Device
Image
The Applications Folder on Mac: How to Find and Access Your Apps
More About Cleaning

Gaming

How_to_overclock_your_GPU-Thumb
How to Overclock Your GPU to Boost Your Games’ FPS
Image
How to Safely Overclock Your CPU for PCs & Laptops
More About Gaming

Hardware

Image
Why Your Mouse Is Broken or Not Working and How to Fix It
Image
What Motherboard Do I Have & How Do I Find Out?
More About Hardware

Software

Image
What Is Firmware?
Image
How to Update Apps on an Android Phone
More About Software

Drivers

Image
How to Fix the “Driver Is Unavailable” Printer Error
Image
How to Update Graphics Drivers in Windows 11, 10, 8, and 7
More About Drivers

Performance Tips

Image
Facebook Session Expired: Causes, Solutions, and Prevention
Image
How to Get Your Mouse Cursor Back: 11 Tried and Tested Methods
More About Performance Tips
Show more Performance articles

Tags

DESKTOP MOBILE WINDOWS MAC IOS ANDROID

What's New on Avast Academy

Security
Privacy
Performance
  • Brushing Scams: What Are They and How Do They Work?
  • New Avast One vs Legacy Avast One: What’s Changed?
  • What Is the New Avast One?
  • Is Mercari legit? A guide to safe shopping and avoiding scams
  • Is BlueStacks safe?
  • Credential Stuffing: What It Is and How To Prevent It
  • What is the Nigerian Prince scam?
  • Is WeTransfer Safe?
  • What is a dictionary attack?
  • Is Poshmark Legit?
  • What Is VPN Split Tunneling?
  • VPN Kill Switch: What It Is and Why It Matters
  • How to Prevent Elder Financial Abuse
  • What Is a Replay Attack and How Does It Work?
  • What Is VoIP and How Does It Work?
  • What to do if you lose your wallet
  • How to Find Hidden Apps on Android
  • Six New Ways Avast Secure Browser Helps Keep You Safe, Private, and in Control
  • Is TikTok Shop Safe and Legit?
  • Is AliExpress Legit? How to Buy From AliExpress Safely
  • What Is Firmware?
  • Facebook Session Expired: Causes, Solutions, and Prevention
  • How to Get Your Mouse Cursor Back: 11 Tried and Tested Methods
  • How to Split Screens on Your PC or Laptop (Windows 10 & 11)
  • Your Phone Is Not Registered On a Network: What It Means and How to Fix It
  • How to Update Apps on an Android Phone
  • How to Clear the Instagram Cache on Your Device
  • The Applications Folder on Mac: How to Find and Access Your Apps
  • How to Clear System Data or “Other” Storage from Your iPhone
  • How to Fix Corrupted Files on Windows Using SFC And DISM

Get free scam and malware protection for PC with Avast One

Free download

Get free scam and malware protection for your iPhone with Avast Mobile Security

Avast
Mobile Security

Free install

Get free scam and malware protection for Mac with Avast One

Free download

Get free scam and malware protection for Android with Avast Mobile Security

Avast
Mobile Security

Free install
Avast
https://4650993.fs1.hubspotusercontent-na1.net/hubfs/4650993/New_Avast_Academy/academy_new_awards_2025/av-comparatives-top-rated-2025.png 2025
Top Rated
Product
https://4650993.fs1.hubspotusercontent-na1.net/hubfs/4650993/New_Avast_Academy/academy_new_awards_2025/av-lab-product-of-the-year-2026.png 2026
Product of the Year

Get free scam and malware protection for PC with Avast One

Free download
Avast
https://4650993.fs1.hubspotusercontent-na1.net/hubfs/4650993/New_Avast_Academy/academy_new_awards_2025/av-comparatives-top-rated-2025.png 2025
Top Rated
Product
https://4650993.fs1.hubspotusercontent-na1.net/hubfs/4650993/New_Avast_Academy/academy_new_awards_2025/av-lab-product-of-the-year-2026.png 2026
Product of the Year

Get free scam and malware protection for your iPhone with Avast Mobile Security

Free install
Avast
https://4650993.fs1.hubspotusercontent-na1.net/hubfs/4650993/New_Avast_Academy/academy_new_awards_2025/av-comparatives-top-rated-2025.png 2025
Top Rated
Product
https://4650993.fs1.hubspotusercontent-na1.net/hubfs/4650993/New_Avast_Academy/academy_new_awards_2025/av-lab-product-of-the-year-2026.png 2026
Product of the Year

Get free scam and malware protection for Mac with Avast One

Free download
Avast
https://4650993.fs1.hubspotusercontent-na1.net/hubfs/4650993/New_Avast_Academy/academy_new_awards_2025/av-comparatives-top-rated-2025.png 2025
Top Rated
Product
https://4650993.fs1.hubspotusercontent-na1.net/hubfs/4650993/New_Avast_Academy/academy_new_awards_2025/av-lab-product-of-the-year-2026.png 2026
Product of the Year

Get free scam and malware protection for Android with Avast Mobile Security

Free install

For Home

  • Support
  • Security
  • Privacy
  • Performance
  • Blog
  • Forum

For Business

  • Business support
  • Business products
  • Business partners
  • Business blog
  • Affiliates

For Partners

  • Mobile Carriers

Company

  • Contact Us
  • Careers
  • Press Center
  • Digital trust
  • Technology
  • Research Participation
© 2026 Gen Digital Inc. All rights reserved.
  • Privacy policy
  • Legal
  • Report vulnerability
  • Contact security
  • Modern Slavery Statement
  • Do not sell my info
  • Cookie Settings