A Brief History of Viruses and Malware

You know computer viruses are bad news, but do you know where they come from? Join AVG in uncovering the true history of viruses and malware.

What Is Hacking | What Does It Mean to Be a Hacker?

An explanation of hacking: what it really is, what makes a hacker, the different kinds of hackers. Including a rundown of some prominent hackers of all kinds.

What Is a Digital Identity and How Can You Protect Yours?

Find out what having a digital identity really means as well as discover ways to keep yours safe, secure, and protected as you roam the digital world.

The Ultimate Guide to Data Encryption | Protect Your Data

Learn how data encryption works and how it can protect your personal information online and on your device. Explore VPNs, end-to-end encryption, and more.

Download Free Anti-Spyware Tool | Spyware Removal

Scan and remove spyware from your PC with our free anti-spyware software. Protect your activity and personal data from bad actors with the click of a button.

Download Free Trojan Scanner & Remover

Scan and remove trojans & viruses on Windows, Mac or mobile for free with the click of a button. Clean out your PC and protect against other threats.

Free Rootkit Scanner & Remover | Anti-Rootkit Tool

Scan and remove malicious rootkits the easy way with our complete anti-rootkit tool. Prevent unauthorized access to your system and personal files.

Download Free Adware Cleaner & Removal Tool

Download our free anti-adware tool to scan, detect and remove adware with the click of a button. Protect your PC, Mac or phone and banish irritating ads.

Free Virus Scanner & Cleaner | Malware Removal Tools

Download our free virus scan and malware removal tool. Clean your PC or other devices and stay protected with the most advanced anti-malware solution.

Free Ransomware Protection Tool | Anti-Ransomware Software

Download our free ransomware protection software and defend against ransomware attacks on Windows, Mac, or your smartphone.

What is a Sniffer? | How to Protect Yourself

Your complete guide to sniffers. Find out how sniffing works, and how to detect and remove network sniffers from your computer now.

Should I Use a VPN, Proxy, or Tor: What’s the Difference?

VPNs vs. proxy servers vs. Tor: learn how they work, discover the differences between them, and decide which will best protect your online identity.

What is Adware and How to Get Rid of it

Adware is aggressive or malicious advertising software that bombards you with unwanted ads. Find out more about adware and how to remove it.

What is a Rootkit? | How to Protect Yourself

Hidden deep in the OS, rootkits let hackers control your device without your consent. Learn how to root out the rootkits with AVG's anti-malware tools here.

What is Streaming & How Does it Work?

From YouTube to Netflix, we've probably all done some internet streaming. But what is streaming and how does it work? Find out here.

What is Spyware and How to Remove it Forever

Spyware is malicious software that spies on you and steals your private data. Learn how spyware works and how to remove it with anti-spyware software.

What is a Trojan Horse? Is it a Virus? | Trojan Definition

In computing, a Trojan horse is a decoy that hides malware. Find out what a Trojan is and how to detect and protect against this sneaky type of attack.

What is Pharming? | How to Protect Against Attacks

Pharming is a scam where attackers send you to fake websites to steal your personal info. Learn about pharming, how it works, & how to protect against it.

The Most Dangerous & Famous Hackers Today

No matter the color of their hat, hackers are a dangerous force to reckon with. Let’s take a look at some of the most prolific together.

Cybersecurity Basics

12 cybersecurity terms to help you protect yourself against basic threats.

What is Malware? How Malware Works & How to Remove It

Everything you should know about malware, how it works, what it does and how to remove it. Find the best anti-malware and malware removal tools here!

Don’t Get Caught in a Catfishing Net of Lies

Watch out for these red flags on dating sites and social media so you can protect yourself and your bank account from romantic scams.

Online Tracking: What It Is, How It Works & How to Stop It

Learn what online tracking is, how it works, and who's tracking you on the web. Find out why you're being tracked online & what you can do to protect your data.

What is a Man-in-the-Middle Attack?

The ultimate in cyber eavesdropping, a man-in-the-middle attack (MITM) effectively jumps into your conversation with a server and secretly steals or alters your communications. Find out more about how it works and how you can prevent it here.

Is Malware Spying on You Even When Your Mobile Is Off?

Newly discovered Android malware hijacks your phone even when you believe you have switched it off. Find out how it works.

Is It Safe to Give Out Your CVV Code?

Find out when it's safe to give out your card verification value (CVV) plus other tips to avoid credit card fraud when shopping online.

What is a Keylogger? | How to Protect Your Passwords

Your complete guide to keylogging: what it is, how to protect your passwords and credit card info, and how to detect and remove a keylogger.

What is a DDoS Attack? | The Ultimate Guide

Everything you ever wanted to know about Denial of Service attacks, including how they work, their history, and how to stay safe from one. This easy-to-read expose will help you better understand one of the most common attacks out there.

What is a Botnet? | How to Detect & Prevent

Zombies are real, and your computer might be one! Learn everything you’d ever want to know about botnets, including how to keep out of one. This comprehensive guide will also teach you about historical botnets, how they’re put together, and the sort of damage they can do to the unprepared.

Smart DNS Proxy Server vs VPN

What's the difference between a Smart DNS and a VPN? Find out when to use a Smart DNS and when to use a VPN to unblock websites, browse anonymously, or just stay safe online. Know what to look for when choosing a Smart DNS or VPN service.

What is Malvertising? Attack of The Ads

Ads can do more than deliver a nice deal or an annoying popup. They can deliver payloads of malware too. Find out how.

Mac Ransomware is Real | How to Prevent it & Remove it

Your complete guide to Mac ransomware, how to remove it and what you can do to protect yourself against attack. (Plus a quick story about hot dogs with human faces.)

What All Android Users Need to Know About Ransomware

Your complete guide to Android ransomware and what you can do to protect yourself against attacks.

What is Phishing? Avoid Phishing Emails, Scams & Attacks

Learn everything you ever wanted to know about phishing emails (and then some) and how to avoid becoming a victim. Learn to secure yourself in minutes.

What is Ransomware: Guide to Protection and Removal

Worried about the next big ransomware attack? Read our guide to learn how to protect yourself against ransomware, or how to remove it if you’ve been infected.

Guide to Android App Permissions & How to Use Them Smartly

Android app permissions can give apps control of your phone and access to your private conversations, photos, and more. Here's what you need to know to stay safe and in control.

What is a Computer Virus? | The Ultimate Guide to PC Viruses

Find out what a computer virus is, what it does, how it spreads and how you can protect yourself, with examples of the most common types of virus.

What is a VPN? | Everything You Need to Know

The ultimate guide to Virtual Private Networks (VPNs), how they work and how they protect you. Learn why you shouldn't surf without one, and how to choose one.

What is DNS Hijacking?

You type in an address, and get redirected to a fake websites that steals your passwords. Here's how it happens, and what you can do to stay protected.

Show more articles