A Brief History of Viruses and Malware

You know computer viruses are bad news, but do you know where they come from? Join AVG in uncovering the true history of viruses and malware.

What Is Hacking | What Does It Mean to Be a Hacker?

An explanation of hacking: what it really is, what makes a hacker, the different kinds of hackers. Including a rundown of some prominent hackers of all kinds.

What Is a Digital Identity and How Can You Protect Yours?

Find out what having a digital identity really means as well as discover ways to keep yours safe, secure, and protected as you roam the digital world.

The Ultimate Guide to Data Encryption | Protect Your Data

Learn how data encryption works and how it can protect your personal information online and on your device. Explore VPNs, end-to-end encryption, and more.

Cybersecurity, Performance & Privacy | Top Tips & Guides

From preventing viruses, to keeping your personal info private online, to getting the most out of your devices, AVG is here to help with our advice roundup.

5 Quick Tips For a Safer Browsing Experience

5 top tips to help you learn more about safe browsing when you’re online, from why it's important to keep your software updated, to ad blockers, VPNs, cookies, and password safety.

Don’t Let Your Social Media Past Ruin Your Future

We’re not always proud of what we’ve done, so make sure you go back and erase your less-than-glorious memories: before they come back to bite you.

Contact Tracing Apps and Their Privacy Concerns

An overview of the state of contact tracing apps, how they might stop the spread of COVID-19, and the privacy concerns surrounding their fast adoption.

How to Unblock Websites & Access Restricted Content

Blocked websites are a pain, especially when they stop you from accessing your favorite content. Learn how to unblock websites at school, work, or home.

How to Set Up a VPN on Windows 10, 8 or 7

A VPN protects your privacy and secures your data while you're online. Learn how to set up a VPN on Windows quickly and easily with our expert guide.

Download Free Anti-Spyware Tool | Spyware Removal

Scan and remove spyware from your PC with our free anti-spyware software. Protect your activity and personal data from bad actors with the click of a button.

Download Free Trojan Scanner & Remover

Scan and remove trojans & viruses on Windows, Mac or mobile for free with the click of a button. Clean out your PC and protect against other threats.

Free Rootkit Scanner & Remover | Anti-Rootkit Tool

Scan and remove malicious rootkits the easy way with our complete anti-rootkit tool. Prevent unauthorized access to your system and personal files.

Download Free Adware Cleaner & Removal Tool

Download our free anti-adware tool to scan, detect and remove adware with the click of a button. Protect your PC, Mac or phone and banish irritating ads.

The Pros and Cons of Video Chat Apps

What are the pros and cons of various video chat apps, how secure are they, and which are the best to stay connected when you’re stuck at home.

5 Tips to Make Working From Home Work for You

5 of our best ideas about how to make working from home work better for you during the global pandemic.

How to Stay Sane on Social Media in the COVID-19 Age

Social media can make staying at home easy… or harder than ever before. Try some simple tips to avoid being negatively influenced.

How to Hide Apps on iPhone & iPad

Got some apps that you'd rather keep secret? Read our guide on how to hide apps on an iPhone — and how to find them again!

Free Virus Scanner & Cleaner | Malware Removal Tools

Download our free virus scan and malware removal tool. Clean your PC or other devices and stay protected with the most advanced anti-malware solution.

Free Ransomware Protection Tool | Anti-Ransomware Software

Download our free ransomware protection software and defend against ransomware attacks on Windows, Mac, or your smartphone.

How to Avoid Coronavirus Malware & Misinformation

Phishing scams preying on the coronavirus pandemic is on the rise. Find out how you can steer clear of COVID-19 malware.

Is Your Smartphone Tracking You

An overview of the complex ways your smartphone and its apps track your personal data, the legality of it, and what you can do to protect some of your privacy.

What is a Sniffer? | How to Protect Yourself

Your complete guide to sniffers. Find out how sniffing works, and how to detect and remove network sniffers from your computer now.

The Most Secure Messaging Apps for Android & iOS 2020

A secure messaging app can protect your chats from the prying eyes of hackers and governments. But how can you be sure? Discover your best options here.

Best Free Antivirus Software 2020 for Windows 7, 8 & 10

The top 10 best free antivirus programs for Windows 7, 8, and 10. Choose the right antivirus software for 2020 & protect yourself from malware & other threats.

Should I Use a VPN, Proxy, or Tor: What’s the Difference?

VPNs vs. proxy servers vs. Tor: learn how they work, discover the differences between them, and decide which will best protect your online identity.

The Uses and Abuses of Facial Recognition

An overview of facial recognition technology. The different forms, what its uses are, how it’s evolving, the potential privacy problems and benefits.

The Dirty Truth About USBs

USB devices are like slices of cake: nice as long as you don't find them randomly on the ground. Let AVG explain the risks of plugging in strange USB devices.

Are You an Online Oversharer?

Are you sharing too much about yourself online? You could be without even knowing it. AVG talks through the risks of online oversharing.

What is Adware and How to Get Rid of it

Adware is aggressive or malicious advertising software that bombards you with unwanted ads. Find out more about adware and how to remove it.

What is a Rootkit? | How to Protect Yourself

Hidden deep in the OS, rootkits let hackers control your device without your consent. Learn how to root out the rootkits with AVG's anti-malware tools here.

How to Get Rid of a Virus & Other Malware on Your PC & Mac

Is your PC, Mac, or laptop infected with a computer virus? Follow these steps to detect and get rid of viruses & malware like Trojans, spyware, and adware.

What is Smishing and How to Avoid it

A simple explanation of sms phishing (smishing) and how it might occur on your mobile phone. Find out some simple tips to guard yourself against it.

5 Common Misconceptions Busted

We’re debunking the 5 most common misconceptions about the devices you use everyday. From Macs and viruses to how incognito mode really works.

The Ups and Downs of Drones

Drones are getting smarter, but are the people operating them? AVG takes a look at drones, and all the exciting (and scary) ways they're being used today.

What is Streaming & How Does it Work?

From YouTube to Netflix, we've probably all done some internet streaming. But what is streaming and how does it work? Find out here.

How to Hide Apps on Android: Hide Icons & Disguise Apps

Read our step-by-step guide to hide apps on your Android phone. Keep your activity a secret from prying eyes or clear out your home screen icons.

AVG Still Supports Windows 7

Microsoft has ended support for Windows 7. But don't worry — AVG still protects our Windows 7 users. Get more info here.

What is Spyware and How to Remove it Forever

Spyware is malicious software that spies on you and steals your private data. Learn how spyware works and how to remove it with anti-spyware software.

5 Threats to Watch Out for in 2020

A new year means new threats. Let AVG tell you what online dangers to look out for in 2020, and how to stay safe.

Is Your Smart TV Watching You?

Your smart TV might be collecting data about your viewing habits. What can you do to protect yourself?

Is 2020 the Year We Save the Internet?

There’s a bold new plan to save the internet in 2020. Why is it needed and can it be done?

What is a Trojan Horse? Is it a Virus? | Trojan Definition

In computing, a Trojan horse is a decoy that hides malware. Find out what a Trojan is and how to detect and protect against this sneaky type of attack.

5 Feel-Good Charities in the Digital Age

Let’s visit the brighter side of the online world by looking at five groups making the world — and the internet — a better, safer, and more inclusive place.

7 Tips for Safer Online Shopping & Payment

What are the risks of online shopping? Discover the many scams you should look out for and read our tips for safer online purchasing.

A Guide to Finding Your IP Address on Windows & Mac

Learn how to find your IP address on a Windows or Mac system. Whether you need to know your public or local IP address, we've got you covered.

What is Pharming? | How to Protect Against Attacks

Pharming is a scam where attackers send you to fake websites to steal your personal info. Learn about pharming, how it works, & how to protect against it.

How to Remove a Virus from Your iPhone or Android Phone

Learn how to scan and remove viruses from your iPhone or Android phone. Say goodbye to mobile malware, malicious apps, and annoying adware pop-ups!

The Most Dangerous & Famous Hackers Today

No matter the color of their hat, hackers are a dangerous force to reckon with. Let’s take a look at some of the most prolific together.

What is the Dark Web and What is it Used For?

A concise explanation of the dark web: what it is, how to access it, the uses of it, and what kind of sites are found there.

How to Check if a Website is Safe

Website safety checks are vital to keeping safe online, but how can you tell if a site is secure? Just follow these tips.

5 Fun Ways to Pointlessly Gamble Your Data

The internet can be risky… but how risky, exactly? Let’s look at all the fun ways you put your online security at risk doing even the most basic tasks online.

The Dangers of DNA Testing

The privacy risks and possible benefits of getting a DNA test from companies like 23andMe, AncestryDNA, and MyHeritage DNA

Cybersecurity Basics

12 cybersecurity terms to help you protect yourself against basic threats.

The Nasty Truth of Data Breaches

Millions of people have their private information exposed in new data breaches every day. Learn how you can respond if you've been impacted.

5 Types of Risky IoT Devices to Avoid

Many smart devices leave you vulnerable to security risks and hacks. Avoid these five types of connected items to stay safe and secure.

How to Create a Strong Password — That You Won’t Forget

Need to create a secure password that hackers can't guess? Use a passphrase! Make an easy to remember, yet hard to crack, password with our tips.

Stop Robocalls with these 5 Steps | Ultimate How-To Guide

The increase of robocall scams is a scourge. Read our guide on how to stop unwanted robocalls in 5 steps. Use a blocker app, report to the FTC, and more.

What is Malware? How Malware Works & How to Remove It

Everything you should know about malware, how it works, what it does and how to remove it. Find the best anti-malware and malware removal tools here!

Deepfake Videos: Is There Anything You Can Do to Protect Yourself?

An investigation of deepfake videos: what they mean for the future and how they can be detected.

What You Need to Know About the BlueKeep Vulnerability

The NSA is strongly urging Windows users to update their systems — ASAP! — to avoid the BlueKeep vulnerability.

How to Avoid ATM and Bank Card Fraud

Learn about the different ways fraudsters can steal money from your bank account through ATMs and what you can do to protect your cards.

5 Cybersecurity To-Dos Before You Travel

Malware makes for a bad souvenir: make sure you’re safe when you travel by taking five easy steps before you head out the door.

How to Book Travel Securely

Whether you’re yearning for a blissful beach or a marvelous mountain, make sure you don’t fall victim to travel booking scams.

The Digital Trail You Leave Throughout Your Day

Nearly every interaction you have with technology throughout your day leaves a digital trail for advertisers. Find out how to limit it.

The Large-Scale Cyberattack Survival Guide

Everything you need to know to survive the Big One. Here are 7 tips on how to stay protected and make sure you don't get roped into a cyberwar when large nation states start slinging digital arrows at each other.

Don’t Get Caught in a Catfishing Net of Lies

Watch out for these red flags on dating sites and social media so you can protect yourself and your bank account from romantic scams.

Is Facebook Listening to Our Private Conversations?

Find out if Facebook is eavesdropping on you through your phone, and learn what can be done about it.

4 Ways to Avoid Spam

Almost every email account has an anti-spam feature, but AVG can help you avoid getting those spam emails in the first place.

Is Bitcoin Safe? | 3 Reasons Bitcoin is (Mostly) Secure

How safe are bitcoins? Find out how Bitcoin secures your transactions, and when you should take extra steps to protect your digital currency.

How to Keep Your Children Safe Online

Surprise yourself with some chilling data about children’s internet usage, and learn how to keep your children safe from the dangers of the internet.

3 Online Threats To Watch Out For in 2019

Check out the big online security threats coming our way in 2019 and learn how to beat them to the punch with this easy expert guide -- all in plain English.

Online Tracking: What It Is, How It Works & How to Stop It

Learn what online tracking is, how it works, and who's tracking you on the web. Find out why you're being tracked online & what you can do to protect your data.

Facebook Leak: Check if Your Data is Part of The Breach

The quickest way to check if your Facebook account is part of the latest data leak. It affects nearly 30 million Facebook users -- make sure you're not one of them!

What is a Man-in-the-Middle Attack?

The ultimate in cyber eavesdropping, a man-in-the-middle attack (MITM) effectively jumps into your conversation with a server and secretly steals or alters your communications. Find out more about how it works and how you can prevent it here.

Is Malware Spying on You Even When Your Mobile Is Off?

Newly discovered Android malware hijacks your phone even when you believe you have switched it off. Find out how it works.

Is It Safe to Give Out Your CVV Code?

Find out when it's safe to give out your card verification value (CVV) plus other tips to avoid credit card fraud when shopping online.

Check Out These Real-Life Airline Scams

These real-life airline online scams leave people with empty pockets. From fake websites to credit card theft, spot the warning signs before it’s too late

How to Check if an Android App is Safe to Install

With scams and viruses lurking on the Play Store, how can you ensure an app is safe to use? Whether gaming or mobile banking, try these quick checks.

How to Prevent Your Car From Being Hacked

Follow these 6 tips to stop criminals from hacking your car’s locks and computer system. Here are the essential steps that you can start doing right now to protect your car or truck.

What is a Keylogger? | How to Protect Your Passwords

Your complete guide to keylogging: what it is, how to protect your passwords and credit card info, and how to detect and remove a keylogger.

What is a DDoS Attack? | The Ultimate Guide

Everything you ever wanted to know about Denial of Service attacks, including how they work, their history, and how to stay safe from one. This easy-to-read expose will help you better understand one of the most common attacks out there.

How to Password Protect Excel Files, Word Docs, PowerPoints

Easily add a password to your Microsoft Excel, Word, or PowerPoint files to prevent anyone from opening them. Works with Microsoft Office 365, Office 2016, Office 2013, and Office 2010 for Windows.

The Ultimate Guide to Mac Security

Think you've got Mac security covered? Learn how to protect your Mac from common threats like viruses, thieves and snoops with our essential safety tips.

How to Protect Your Private Documents With Sensitive Data Shield

Protect your private Word docs, PDFs, and other documents with AVG's newest privacy feature.

How to Hide Your IP Address

Governments and businesses are snooping more than ever -- so you might want to hide your IP address. Learn how to do it by using a proxy server, VPN or Tor.

What is a Botnet? | How to Detect & Prevent

Zombies are real, and your computer might be one! Learn everything you’d ever want to know about botnets, including how to keep out of one. This comprehensive guide will also teach you about historical botnets, how they’re put together, and the sort of damage they can do to the unprepared.

[UPDATED] Why Is The FBI Asking You To Restart Your Router? (hint: hackers)

It's the latest router malware, and it can potentially cause quite a mess. Find out about the VPNFilter malware, see if it affects your router, and learn how to get rid of it with one quick and easy trick.

How to Set Up & Use a VPN on Your Mobile Phone

This step-by-step guide helps you set up and connect to a VPN client on your iPhone or Android phone. Start using a mobile VPN today and keep your online activity private and anonymous.

Smart DNS Proxy Server vs VPN

What's the difference between a Smart DNS and a VPN? Find out when to use a Smart DNS and when to use a VPN to unblock websites, browse anonymously, or just stay safe online. Know what to look for when choosing a Smart DNS or VPN service.

What is Malvertising? Attack of The Ads

Ads can do more than deliver a nice deal or an annoying popup. They can deliver payloads of malware too. Find out how.

Why isn’t My Android Phone Getting Updates?

There’s a serious problem with Android system updates. Why do they take so long to arrive and what can be done to improve this?

Mac Ransomware is Real | How to Prevent it & Remove it

Your complete guide to Mac ransomware, how to remove it and what you can do to protect yourself against attack. (Plus a quick story about hot dogs with human faces.)

How to Stay Safe on Twitter | Ultimate Guide

Thirty-three tweetable Twitter tips to protect your safety and privacy, clocking at 280 characters or less. #tweetsafely

Mythbusters: VPN for Gaming – Do You Really Need One?

The real truth about how gamers use VPNs. Whether you're a pro gamer or casual, here are all the reasons you might need a VPN — and all the reasons why you probably don't.

What All Android Users Need to Know About Ransomware

Your complete guide to Android ransomware and what you can do to protect yourself against attacks.

What is Phishing? Avoid Phishing Emails, Scams & Attacks

Learn everything you ever wanted to know about phishing emails (and then some) and how to avoid becoming a victim. Learn to secure yourself in minutes.

What is Ransomware: Guide to Protection and Removal

Worried about the next big ransomware attack? Read our guide to learn how to protect yourself against ransomware, or how to remove it if you’ve been infected.

Guide to Android App Permissions & How to Use Them Smartly

Android app permissions can give apps control of your phone and access to your private conversations, photos, and more. Here's what you need to know to stay safe and in control.

Meltdown and Spectre Megabugs: a Quick ‘n Easy Guide

The latest on the Meltdown and Spectre processor bugs -- where they come from, who they affect, how they work and how to fix them -- explained simply.

Santa: The Greatest Malware of all Time

Think Santa's all about presents, cookies and milk? Think again. This jolly jelly-belly is ruthlessly spying on everyone. He's the greatest malware of all time.

What is a Computer Virus? | The Ultimate Guide to PC Viruses

Find out what a computer virus is, what it does, how it spreads and how you can protect yourself, with examples of the most common types of virus.

What is a VPN? | Everything You Need to Know

The ultimate guide to Virtual Private Networks (VPNs), how they work and how they protect you. Learn why you shouldn't surf without one, and how to choose one.

End Webcam Spying for Good

Keep Peeping Toms and other would be webcam hackers from spying on you with with AVG Internet Security's newest feature: Webcam Protection. See how it works.

Equifax Hack: How to Protect Your Identity, Credit Cards, and More

Are you part of the 143 million people whose social security info could have leaked in the Equifax hack? Here’s everything you need to know to protect yourself.

7 Essential iPhone Security Tips

The iPhone isn't invulnerable. Here are 7 easy ways you may not know to lock down your iPhone and ensure your security against hackers and thieves.

Is Your Partner Spying on You With a Keylogger?

Keyloggers secretly record everything you type — your emails, passwords, credit card details... Learn how to avoid, detect, and remove them from your PC.

The Dangers of Webcam Spying and How to Avoid Them

Webcam hacking is dangerous, but your phone camera and surveillance system can also be used to spy on you. Here’s how to protect yourself.

Windows 10 Privacy | Is Windows 10 Spying on You?

Windows 10 is known for collecting data and sending it back to the Microsoft mothership. Find out which settings to tweak to keep Windows 10 from spying on you.

2017 Petya Ransomware Outbreak — Your Quick Safety Guide

Petya ransomware is back with a vengeance - and we know how to keep you safe from it

Our Best Ransomware Protection is Here

AVG now offers advanced ransomware protection for Internet Security users. Ransomware Protection stops any malware from harming your personal photos and files.

Avoid These Mistakes When Using Free Wi-Fi

Checking your balance on that free airport Wi-Fi could end up costing you everything you have. Here’s how to avoid getting hacked while using public Wi-Fi.

WannaCry Ransomware: What You Need to Know

It's been called the worst ransomware attack in history. Here's what you need to know about WannaCry to stay protected, or to recover your files...

5 Reasons To Get an Ad Blocker

Ad blockers are more than just convenient ways of cleaning up the web. They also carry security, usability, and ethical challenges. Should you use one?

Why Cleaning Your Browser Makes It Safer

Your browser collects more information than you, and that can be used for or against you. Ever wondered what the catch in your browser's cache was?

What is DNS Hijacking?

You type in an address, and get redirected to a fake websites that steals your passwords. Here's how it happens, and what you can do to stay protected.

AVG Evolved: The Future of Antivirus

AVG AntiVirus is getting its biggest update yet: new U.I.s, new features, new detection engine — better protection all around.

Why You Need a Password Manager

You need a unique and random password for every one of your online accounts - an near impossible feat for mere mortals without a manager

Top Safest and Most Dangerous US States for PCs

Some states are more dangerous than others for PCs -- we tell you which ones have the highest and lowest levels of malware.

Why You Should Cover the Camera on Your Laptop

Learn why all the biggest names in security and tech cover their webcams. Find out why you should cover the camera on your computer or laptop.

Is It Safe to Log in with Facebook or Google?

It's fast. It's easy. But is it safe? Logging into websites with Facebook and Google has its risks - but also its advantages.

Your Password Sucks

We can all be lazy -- but we should fight the urge when it comes to creating and using passwords. Here's what NOT to do.

Spot the Scam!

Phishing is one of the primary ways online thugs move malware on to PCs. Learn to spot the signs to avoid getting hooked.

6 Ways Your Email Account Can Be Hacked

Hopefully it will never happen to you. But if you are unfortunate enough to have your email hacked, it is probably for one of these reasons.

3 Reasons to Never Use Fingerprint Locks on Phones

Fingerprint locks may be easy to use but they have some serious flaws and may be more dangerous than they are worth.

The Cost of Ransomware

Ransomware generates millions of dollars in revenue for the criminals that use it. It costs the victims money, time and emotional and psychological damage.

Email Security Checklist

Read our guideline - 9+1 tips how to stay safe online. What to be careful about with your email account.

How to Spot Phishing Attacks

Phishing is one the primary ways malware gets spread around the Internet -- know the signs so you can avoid the hooks.

Top Facebook Scams You Need to Know About

Social media is now part of life - and so fertile ground for bad guys. Watch out for these scams and nasty tricks when hanging out on Facebook.

World’s 25 Worst Passwords Revealed! Is Yours One of Them?

Passwords are a ubiquitous part of life online - and too often we take them for granted. We take shortcuts and create and reuse passwords that are imminently crackable.

Have You Ever Chatted With a Hacker Within a Virus?

Threat Labs team members speak with a hacker inside a keylogger for Diablo 3. How does such a situation look like? Read on!

What is Two-Factor Authentication & Why is it Important?

AVG explains two-factor authentication, why it's an important security measure, and how you can start using it to improve the security of your online accounts.

Thomson Data Breach Exposes Passenger Details

UK based holiday company Thomson has accidentally released hundreds of passengers' details. Which data have leaked and should you cancel your vacation?

Which is the Most Secure Android Smart Lock?

Android Lollipop comes with several innovative security features to lock and unlock your phone with ease. But just how safe are they? Let’s take a look.

AVG Reveals Invisibility Glasses at Pepcom Barcelona

This year, AVG will reveal a set of concept invisibility glasses at Pepcom in Barcelona before Mobile World Congress. Why would they be useful? Read on!

Analysis of Banking Trojan Vawtrak

Vawtrak binaries are continuing to evolve. We are witnessing minor changes in its features, target regions or banks. These changes create spikes in detections every 2-5 days.

Scammers Trying to Steal Netflix Passwords, and More

Be on the lookout for a new phishing email claiming to be from Netflix with the subject line “Important Notice”.

Analyzing an Android WebView Exploit

Mobile threat team analyzes a recently discovered Android WebView exploit. What to do and how to fix? Read on!

AVG Community Powered Threat Reports 2012

AVG has focused on building communities that help millions of online participants support each other on computer security issues and actively contribute to AVG’s research efforts.

Threat Report Reveals Pre-teen Children Developing Malicious Code

The AVG Threat Report reveals computer-savvy kids writing a malware code to hack somebody's Facebook account. What are their motivations? Read on!

Show more articles