Find out if Facebook is eavesdropping on you through your phone, and learn what can be done about it.
How safe are bitcoins? Find out how Bitcoin secures your transactions, and when you should take extra steps to protect your digital currency.
The top 10 best free antivirus programs for Windows 7, 8, and 10, and Linux OS. Choose the right antivirus software from our top 10 list for 2019 and protect yourself from malware and other threats.
The quickest way to check if your Facebook account is part of the latest data leak. It affects nearly 30 million Facebook users -- make sure you're not one of them!
The ultimate in cyber eavesdropping, a man-in-the-middle attack (MITM) effectively jumps into your conversation with a server and secretly steals or alters your communications. Find out more about how it works and how you can prevent it here.
No matter the color of their hat, hackers are a dangerous force to reckon with. AVG takes a look at some of the most prolific of our time. From state actors to skilled individuals, these people have rocked the digital world in some form or another. What can we learn from their exploits?
Your complete guide to keylogging: what it is, how to protect your passwords and credit card info, and how to detect and remove a keylogger.
Everything you ever wanted to know about Denial of Service attacks, including how they work, their history, and how to stay safe from one. This easy-to-read expose will help you better understand one of the most common attacks out there.
Easily add a password to your Microsoft Excel, Word, or PowerPoint files to prevent anyone from opening them. Works with Microsoft Office 365, Office 2016, Office 2013, and Office 2010 for Windows.
Protect your private Word docs, PDFs, and other documents with AVG's newest privacy feature.
Zombies are real, and your computer might be one! Learn everything you’d ever want to know about botnets, including how to keep out of one. This comprehensive guide will also teach you about historical botnets, how they’re put together, and the sort of damage they can do to the unprepared.
It's the latest router malware, and it can potentially cause quite a mess. Find out about the VPNFilter malware, see if it affects your router, and learn how to get rid of it with one quick and easy trick.
Here’s a quick way to prevent third-party apps from accessing your Facebook data. We show you how to keep your Facebook safer from data-hungry companies with a couple of clicks, and save you potential headaches of the Cambridge Analytica kind in the future.
Everything you need to know to survive the Big One. Here are 7 tips on how to stay protected and make sure you don't get roped into a cyberwar when large nation states start slinging digital arrows at each other.
Your complete guide to Mac ransomware, how to remove it and what you can do to protect yourself against attack. (Plus a quick story about hot dogs with human faces.)
The real truth about how gamers use VPNs. Whether you're a pro gamer or casual, here are all the reasons you might need a VPN — and all the reasons why you probably don't.
Your complete guide to Android ransomware and what you can do to protect yourself against attacks.
Learn everything you ever wanted to know about phishing emails (and then some) and how to avoid becoming a victim. Learn to secure yourself in minutes.
Worried about the next big ransomware attack? Read our guide to learn how to protect yourself against ransomware, or how to remove it if you’ve been infected.
Android app permissions can give apps control of your phone and access to your private conversations, photos, and more. Here's what you need to know to stay safe and in control.
The latest on the Meltdown and Spectre processor bugs -- where they come from, who they affect, how they work and how to fix them -- explained simply.
Find out what a computer virus is, what it does, how it spreads and how you can protect yourself, with examples of the most common types of virus.
Are you part of the 143 million people whose social security info could have leaked in the Equifax hack? Here’s everything you need to know to protect yourself.
Webcam hacking is dangerous, but your phone camera and surveillance system can also be used to spy on you. Here’s how to protect yourself.
Petya ransomware is back with a vengeance - and we know how to keep you safe from it
Make a password that's nearly impossible to crack and fun -- that's right, fun -- to remember.
We all know life is risky - but how risky? Take our quiz and see whether you'll live to be a 100 or win a Darwin Award.
Your camera isn't just a window out into the world — it's also a window in. And if you're not using it, you really should be covering it up with tape.
Fingerprint locks may be easy to use but they have some serious flaws and may be more dangerous than they are worth.
Passwords are a ubiquitous part of life online - and too often we take them for granted. We take shortcuts and create and reuse passwords that are imminently crackable.
Threat Labs team members speak with a hacker inside a keylogger for Diablo 3. How does such a situation look like? Read on!
Finding a virus, trojan, or worm on your PC can be alarming, but hope is not lost! Take a deep breath & follow these steps to get rid of a computer virus.
AVG explains two-factor authentication, why it's an important security measure, and how you can start using it to improve the security of your online accounts.
New Google feature allows you to browse through your location history live online.
When it comes to data breaches, why are the stakes higher with healthcare data than any other? Read on!
Everything you should know about malware, how it works, what it does and how to remove it. Find the best anti-malware and malware removal tools here!
This year, AVG will reveal a set of concept invisibility glasses at Pepcom in Barcelona before Mobile World Congress. Why would they be useful? Read on!
Be on the lookout for a new phishing email claiming to be from Netflix with the subject line “Important Notice”.
The AVG Threat Report reveals computer-savvy kids writing a malware code to hack somebody's Facebook account. What are their motivations? Read on!