Man-in-the-middle (MITM) attacks
When you share confidential information face-to-face with others, you’re probably careful not to let others hear — perhaps even whispering so nobody can eavesdrop on your conversation. Taking precautions also applies to the virtual world, especially as we’re learning every day about the increasing threats of cyberattacks that can affect each and every one of
Learn moreSpoofing: How to protect yourself from fraud on the internet
You probably know someone who’s been the victim of an attempted scam, where some fraudster tries to obtain sensitive information using a false identity or something similar. Cybercriminals also use this centuries-old “tradition” of deception, where they pretend to be someone we know or a reputable company to gain access to confidential data or to
Learn moreGuides
View all
Clearing the cache on your Mac
You’re almost certain to have come across the term “cache” if your Mac is...

Internet slow? Let’s explore why it’s more tortoise than hare!
Are videos lagging? Downloads taking forever? Do you feel like you’re spending an eternity...

Body Language Might Give Away Your Password
We’ve all had a lot to worry about in the last couple of years...

Three easy ways to back up and restore your iPhone
We’re not kidding when we say that backing up your iPhone is extremely important...

5 tips for safe online dating
With Valentine’s Day just around the corner, many singletons turn to dating apps to find...

Happy Data Protection Day: Make Every Day Confidential
You probably created data before you made breakfast this morning. Every day you wake...

Formjacking: What it is, and how to protect yourself
You’ve probably heard of bank card cloning as a means of stealing money. In...

Avira partners with YouMail to stop robocalls
“Congratulations! You’ve been approved for a loan!” or “Contact the IRS urgently regarding unpaid...
Featured Articles
The darknet — truly the dark side of the internet?
Many associate the darknet with the digital black market for everything that can only be obtained illegally: Drugs, weapons, viruses and malware, contract killers, poison, credit card numbers, all kinds of sensitive data, and so on. The darknet is situated on the dark side of the internet — after all, it’s also a synonym for
Learn moreWhy aren’t there virus scanners for iPhones?
It seems that not a day goes by without seeing a warning about security flaws, malware, Trojans, ransomware, phishing attacks, viruses, or some other digital threat. And seemingly, it’s only Windows or Android users who are affected — users of Apple products, such as Mac, iPad, or iPhone, rarely get affected if at all. Could
Learn morePersonal Data & Privacy
View allData and the Dark Web: How much is your personal data worth?
With the increasing popularity of online services such as...