AVG
Signal
  • Security
    • Malware
    • Viruses
    • Ransomware
    • Threats
    • Security Tips
    • Internet
    • Scams
    • Phishing
    • IoT
    • AVG News
    See all Security articles
  • Privacy
    • Browser
    • VPN
    • IP Address
    • Hackers
    • Passwords
    • Social Media
    • Privacy Tips
    See all Privacy articles
  • Performance
    • Cleaning
    • Speed
    • Gaming
    • Hardware
    • Performance Tips
    See all Performance articles
    • English
    • Español
    • Deutsch
    • Français
    • Nederlands
    • Italiano
    • Português
AVG
Signal
  • Security
    • Malware
    • Viruses
    • Ransomware
    • Threats
    • Security Tips
    • Internet
    • Scams
    • Phishing
    • IoT
    • AVG News
    View all topics
  • Privacy
    • Browser
    • VPN
    • IP Address
    • Hackers
    • Passwords
    • Social Media
    • Privacy Tips
    View all topics
  • Performance
    • Cleaning
    • Speed
    • Gaming
    • Hardware
    • Performance Tips
    View all topics
  • English
    • English
    • Español
    • Deutsch
    • Français
    • Nederlands
    • Italiano
    • Português
Security
Malware
Viruses
Ransomware
Threats
Security Tips
Internet
Scams
Phishing
IoT
AVG News
See all Security articles
Privacy
Browser
VPN
IP Address
Hackers
Passwords
Social Media
Privacy Tips
See all Privacy articles
Performance
Cleaning
Speed
Gaming
Hardware
Performance Tips
See all Performance articles
English
English
Español
Deutsch
Français
Nederlands
Italiano
Português

Security

We’ve been providing world-class digital threat protection since 1991. Get the expert security advice you need to protect yourself and stay safe online.

Malware
Viruses
Ransomware
Threats
Security Tips
Internet
Scams
Phishing
IoT
AVG News
AVG Signal Blog Security

Malware

More about Malware

What Is Malware? How Malware Works & How to Remove It What Is Malware? How Malware Works & How to Remove It

How to Remove Spyware from a Mac How to Remove Spyware from a Mac

How to Remove Spyware From Android How to Remove Spyware From Android

What Is Malvertising and How to Prevent It What Is Malvertising and How to Prevent It

How to Scan and Remove Malware From Your Router How to Scan and Remove Malware From Your Router

What is Adware and How to Get Rid of it? What is Adware and How to Get Rid of it?

What is Spyware? What is Spyware?

What is a Trojan Horse? Is it Malware or Virus? What is a Trojan Horse? Is it Malware or Virus?

See all "Malware" articles

Viruses

More about Viruses

Best Free Antivirus Programs for 2021 Best Free Antivirus Programs for 2021

Can Macs Get Viruses? Can Macs Get Viruses?

Worm vs. Virus: What's the Difference? Worm vs. Virus: What's the Difference?

What Is a Miner Virus and How Can You Remove It? What Is a Miner Virus and How Can You Remove It?

A Brief History of Computer Viruses A Brief History of Computer Viruses

How to Get Rid of a Virus & Other Malware on Your Computer How to Get Rid of a Virus & Other Malware on Your Computer

See all "Viruses" articles

Ransomware

More about Ransomware

The Ultimate Guide to Ransomware The Ultimate Guide to Ransomware

The Complete Guide to Mac Ransomware and How to Prevent it The Complete Guide to Mac Ransomware and How to Prevent it

WannaCry Ransomware: What You Need to Know WannaCry Ransomware: What You Need to Know

See all "Ransomware" articles

Threats

More about Threats

What Is a Browser Hijacker and How to Remove One What Is a Browser Hijacker and How to Remove One

Zero-Day Attacks: What You Need to Know Zero-Day Attacks: What You Need to Know

What Is an Exploit in Computer Security? What Is an Exploit in Computer Security?

How Secure Is My Phone? How Secure Is My Phone?

Identity Theft: What It Is & How It Works Identity Theft: What It Is & How It Works

What Is a Sniffer and How Can You Prevent Sniffing? What Is a Sniffer and How Can You Prevent Sniffing?

See all "Threats" articles

Security Tips

More about Security Tips

5 Ways to Enhance Your Cybersecurity 5 Ways to Enhance Your Cybersecurity

The Ultimate Guide to Keeping Your Email Secure The Ultimate Guide to Keeping Your Email Secure

What Is a Digital Identity and How Can You Protect Yours? What Is a Digital Identity and How Can You Protect Yours?

5 Tips to Make Working From Home Work for You 5 Tips to Make Working From Home Work for You

How to Avoid Coronavirus Malware & Misinformation How to Avoid Coronavirus Malware & Misinformation

The Dirty Truth About USBs The Dirty Truth About USBs

See all "Security Tips" articles

Internet

More about Internet

How to Check if a Website Is Safe How to Check if a Website Is Safe

What Is Fake News and How Can You Spot It? What Is Fake News and How Can You Spot It?

What Is Streaming? What Is Streaming?

Is 2020 the Year We Save the Internet? Is 2020 the Year We Save the Internet?

Don’t Get Robbed – 7 Tips for Safer Online Shopping Don’t Get Robbed – 7 Tips for Safer Online Shopping

5 Fun Ways to Pointlessly Gamble Your Data 5 Fun Ways to Pointlessly Gamble Your Data

See all "Internet" articles

Scams

More about Scams

What Is Social Engineering and Are You at Risk? What Is Social Engineering and Are You at Risk?

Deepfake Videos: Is There Anything You Can Do to Protect Yourself? Deepfake Videos: Is There Anything You Can Do to Protect...

ATM and Card Fraud: Protect Your Money at Home or Abroad ATM and Card Fraud: Protect Your Money at Home or Abroad

How to Make Travel Plans, the Secure Way How to Make Travel Plans, the Secure Way

Check Out These Real-Life Airline Scams Check Out These Real-Life Airline Scams

See all "Scams" articles

Phishing

More about Phishing

What is Smishing and How to Avoid it What is Smishing and How to Avoid it

Don’t Get Caught in a Catfishing Net of Lies Don’t Get Caught in a Catfishing Net of Lies

See all "Phishing" articles

IoT

More about IoT

Is Alexa Always Listening To Us? Is Alexa Always Listening To Us?

The Ups and Downs of Drones The Ups and Downs of Drones

Is Your TV Watching You? Is Your TV Watching You?

Five Types of Risky Smart Devices to Avoid Five Types of Risky Smart Devices to Avoid

See all "IoT" articles

AVG News

More about AVG News

The Birds, Bees, and Bots: Why Parents Are Having "The Talk" Sooner The Birds, Bees, and Bots: Why Parents Are Having "The Talk"...

5 Feel-Good Technology Stories From 2020 5 Feel-Good Technology Stories From 2020

AVG Still Supports Windows 7 AVG Still Supports Windows 7

AVG Survey Finds that Parents Don’t Know Enough About Their Children’s... AVG Survey Finds that Parents Don’t Know Enough About Their...

See all "AVG News" articles

Tags

EMAIL GOOGLE FACEBOOK DESKTOP MAC ANDROID MOBILE WINDOWS IOS WI FI

New on AVG Signal Blog

Security
Privacy
Performance
  • What Is Fake News and How Can You Spot It?
  • How to Remove Spyware from a Mac
  • How to Remove Spyware From Android
  • What Is a Browser Hijacker and How to Remove One
  • What Is Malvertising and How to Prevent It
  • The Birds, Bees, and Bots: Why Parents Are Having "The Talk" Sooner
  • The Ultimate Guide to Ransomware
  • The Complete Guide to Mac Ransomware and How to Prevent it
  • Can Macs Get Viruses?
  • What Is Social Engineering and Are You at Risk?
  • How to Choose the Best Password Manager
  • How to Speed Up Chrome, Firefox, and IE
  • What Is Router Hacking and How to Prevent It
  • How to Stop Endless Buffering Now
  • How to Unblock Websites & Access Restricted Content
  • What Is a Proxy Server and How Does It Work?
  • What Is Ad Tracking?
  • How to Watch TV Shows and Episodes Online
  • The Best Browsers for Security and Privacy in 2021
  • Are Cookies Bad? Good vs. Bad Cookies
  • 9 Ways to Boost Your Gaming Rig
  • What Is RAM and What Does It Do?
  • How to Check Ram Size, Speed, and Type
  • How to Repair Corrupted Windows System Files Using SFC or DISM
  • SSD or HDD: Which Is Right for You?
  • How to Update Graphics Drivers in Windows 10, 8, and 7
  • Why Your PC Fan Is so Loud and How to Fix It
  • How to Update Sound Drivers in Windows 10 and Earlier
  • How to Find and Check Your Computer Specs in Windows 10, 8, and 7
  • SuperFetch: What You Need to Know

Free Tools for Enhanced Security

  • Free Virus Scan & Malware Removal Tool
  • Free Ransomware Protection Tool
  • Free Adware Scanner and Cleaner Tool
  • Free Anti-Spyware Software
  • Free Trojan Removal Tool & Scanner
  • Free Rootkit Scanner & Remover

About AVG

  • Profile
  • Media Center
  • Policies
  • Contact Us

Home Products

  • Free Antivirus Download
  • Internet Security
  • Android Antivirus
  • Free Mac Antivirus
  • Secure VPN
  • Tune Up
  • Virus Scanning & Malware Removal
  • Installation Files
  • Beta Downloads

Customer Area

  • Anti-Theft Login
  • Home Product Support
  • Security & Performance Tips
  • Online Research

Partners & Business

  • Business Antivirus Software
  • Partner Support
  • Business Support
  • Affiliates

Connect with AVG

  • Facebook
  • Twitter
  • YouTube
  • Blog
AVG Logo

Privacy | Cookies | All third party trademarks are the property of their respective owners.

© 1988-2020 Copyright Avast Software s.r.o.

Log in to AVG MyAccount

We use cookies and similar technologies to recognize your repeat visits and preferences, to measure the effectiveness of campaigns, and improve our websites. For settings and more information about cookies, view our Cookie Policy. By clicking “I accept” on this banner or using our site, you consent to the use of cookies.

I ACCEPT