A secure messaging app can protect your chats from the prying eyes of hackers and governments. But how can you be sure? Discover your best options here.
The top 10 best free antivirus programs for Windows 7, 8, and 10. Choose the right antivirus software for 2020 & protect yourself from malware & other threats.
Is your PC, Mac, or laptop infected with a computer virus? Follow these steps to detect and get rid of viruses & malware like Trojans, spyware, and adware.
Read our step-by-step guide to hide apps on your Android phone. Keep your activity a secret from prying eyes or clear out your home screen icons.
Microsoft has ended support for Windows 7. But don't worry — AVG still protects our Windows 7 users. Get more info here.
In computing, a Trojan horse is a decoy that hides malware. Find out what a Trojan is and how to detect and protect against this sneaky type of attack.
Need to create a secure password that hackers can't guess? Use a passphrase! Make an easy to remember, yet hard to crack, password with our tips.
The increase of robocall scams is a scourge. Read our guide on how to stop unwanted robocalls in 5 steps. Use a blocker app, report to the FTC, and more.
Everything you should know about malware, how it works, what it does and how to remove it. Find the best anti-malware and malware removal tools here!
An investigation of deepfake videos: what they mean for the future and how they can be detected.
The NSA is strongly urging Windows users to update their systems — ASAP! — to avoid the BlueKeep vulnerability.
Everything you need to know to survive the Big One. Here are 7 tips on how to stay protected and make sure you don't get roped into a cyberwar when large nation states start slinging digital arrows at each other.
Find out if Facebook is eavesdropping on you through your phone, and learn what can be done about it.
How safe are bitcoins? Find out how Bitcoin secures your transactions, and when you should take extra steps to protect your digital currency.
Want to get your holiday shopping done online this year? Great idea. Do it safely with these 5 simple tips and avoid scammers, hackers and unpleasant surprises.
The quickest way to check if your Facebook account is part of the latest data leak. It affects nearly 30 million Facebook users -- make sure you're not one of them!
The ultimate in cyber eavesdropping, a man-in-the-middle attack (MITM) effectively jumps into your conversation with a server and secretly steals or alters your communications. Find out more about how it works and how you can prevent it here.
Your complete guide to keylogging: what it is, how to protect your passwords and credit card info, and how to detect and remove a keylogger.
Everything you ever wanted to know about Denial of Service attacks, including how they work, their history, and how to stay safe from one. This easy-to-read expose will help you better understand one of the most common attacks out there.
Easily add a password to your Microsoft Excel, Word, or PowerPoint files to prevent anyone from opening them. Works with Microsoft Office 365, Office 2016, Office 2013, and Office 2010 for Windows.
Protect your private Word docs, PDFs, and other documents with AVG's newest privacy feature.
Zombies are real, and your computer might be one! Learn everything you’d ever want to know about botnets, including how to keep out of one. This comprehensive guide will also teach you about historical botnets, how they’re put together, and the sort of damage they can do to the unprepared.
It's the latest router malware, and it can potentially cause quite a mess. Find out about the VPNFilter malware, see if it affects your router, and learn how to get rid of it with one quick and easy trick.
Here’s a quick way to prevent third-party apps from accessing your Facebook data. We show you how to keep your Facebook safer from data-hungry companies with a couple of clicks, and save you potential headaches of the Cambridge Analytica kind in the future.
Your complete guide to Mac ransomware, how to remove it and what you can do to protect yourself against attack. (Plus a quick story about hot dogs with human faces.)
The real truth about how gamers use VPNs. Whether you're a pro gamer or casual, here are all the reasons you might need a VPN — and all the reasons why you probably don't.
Your complete guide to Android ransomware and what you can do to protect yourself against attacks.
Learn everything you ever wanted to know about phishing emails (and then some) and how to avoid becoming a victim. Learn to secure yourself in minutes.
Worried about the next big ransomware attack? Read our guide to learn how to protect yourself against ransomware, or how to remove it if you’ve been infected.
Android app permissions can give apps control of your phone and access to your private conversations, photos, and more. Here's what you need to know to stay safe and in control.
The latest on the Meltdown and Spectre processor bugs -- where they come from, who they affect, how they work and how to fix them -- explained simply.
Find out what a computer virus is, what it does, how it spreads and how you can protect yourself, with examples of the most common types of virus.
Are you part of the 143 million people whose social security info could have leaked in the Equifax hack? Here’s everything you need to know to protect yourself.
Webcam hacking is dangerous, but your phone camera and surveillance system can also be used to spy on you. Here’s how to protect yourself.
Petya ransomware is back with a vengeance - and we know how to keep you safe from it
We all know life is risky - but how risky? Take our quiz and see whether you'll live to be a 100 or win a Darwin Award.
Your camera isn't just a window out into the world — it's also a window in. And if you're not using it, you really should be covering it up with tape.
Fingerprint locks may be easy to use but they have some serious flaws and may be more dangerous than they are worth.
Passwords are a ubiquitous part of life online - and too often we take them for granted. We take shortcuts and create and reuse passwords that are imminently crackable.
Threat Labs team members speak with a hacker inside a keylogger for Diablo 3. How does such a situation look like? Read on!
AVG explains two-factor authentication, why it's an important security measure, and how you can start using it to improve the security of your online accounts.
New Google feature allows you to browse through your location history live online.
When it comes to data breaches, why are the stakes higher with healthcare data than any other? Read on!
This year, AVG will reveal a set of concept invisibility glasses at Pepcom in Barcelona before Mobile World Congress. Why would they be useful? Read on!
Be on the lookout for a new phishing email claiming to be from Netflix with the subject line “Important Notice”.
The AVG Threat Report reveals computer-savvy kids writing a malware code to hack somebody's Facebook account. What are their motivations? Read on!