Android users are now able to edit their photos with AI, Google announced on Tuesday. In Google Photos, users will be able to talk to the AI using natural language to describe how they want to edit their photo via either voice or text, Google says.
The feature is designed to make it easier to edit photos without having to understand which editing tools to use or where they can be found in the app.
The Gemini-powered feature was initially made available to those with the newly launched Pixel 10 devices in the U.S., introduced in August.
Image Credits:Google
To get started, you can tap “Help me edit” in the editor, then describe how you want to change the photo. If you’re not sure where to start to make improvements, you can also use one of the provided Gemini suggestions or simply tell the AI to “make it better.”
The feature supports the usual types of edits, like lighting adjustments or removing distractions from the images, as well as more advanced edits, like removing objects in the background or restoring an old image. Plus, it can change photos to have fantastical AI elements added, for a bit of creativity.
As you continue to edit, Gemini will support follow-up requests to help you fine-tune your work further.
AI editing is currently available to users 18 and up in the U.S. in English.
The AI feature was announced alongside support for C2PA Content Credentials in Google Photos, which identifies when images were created with AI. This functionality was also initially launched on Pixel devices, but is now coming to Android users, too, Google confirmed to TechCrunch.
The Google Play Store can now handle up to six app downloads or updates at a time.
Previously, the Play Store only supported three simultaneous downloads or updates.
In the past, if you downloaded or updated multiple apps in the Play Store, you would have to wait as those apps downloaded or updated one by one. Google eventually upped this restriction to three apps at a time, and even tested raising it to four. Now it looks like the Play Store has pretty much doubled the limit.
Don’t want to miss the best from Android Authority?
Spotted by the folks over at SammyGuru, it appears there’s been a significant improvement in the number of updates the Play Store can handle. In its testing, the outlet was able to get up to six apps updating at the same time. Any app past six remained in the “Pending” state until a new spot opened up.
The publication notes that they were only able to confirm this on one of their devices. When I tested this out on my own device, I wasn’t able to get six apps going at the same time. However, I did manage to get five apps updating simultaneously. That’s still a big improvement from the previous three-app limitation.
It appears this is a server-side update, so a wider rollout will likely be on the way soon. With this increased update and download limit, getting through your long list of updates should feel a lot faster than before.
Thank you for being part of our community. Read our Comment Policy before posting.
Normally, when it comes to Android malware, when new strains are discovered, they often build upon a previous one. However, that’s not the case with a new Android banking trojan currently making the rounds online. Instead, it appears to be written from scratch with no code similarities to existing malware families.
As reported by The Hacker News, this new banking trojan has been dubbed RatOn by security researchers at Threat Fabric who discovered it while investigating another malware strain that uses near-field communication or NFC in its attacks to steal contactless payment info from unsuspecting Android users. The most surprising part of this new sample was the fact that it wasn’t just in a single malicious app but instead was part of a campaign involving multiple ones.
After analyzing this new campaign further, Threat Fabric found that RatOn is a fully functional banking trojan with several unique capabilities. In addition to being able to take over one of the best Android phones and the accounts on it, the banking trojan can also perform automated money transfers as well as use custom overlay attacks to trick victims into thinking their device is infected with ransomware.
Here’s everything you need to know about this new malware strain, along with some tips and tricks to keep your Android phone safe from banking trojans that can completely drain your financial accounts.
From overlays to automated money transfers
(Image credit: Shutterstock)
In order to trick potential victims into installing their malicious apps, the hackers behind this campaign registered several domains with adult themes, which they then used as a lure. Specifically, these fake sites contained “TikTok18+” in their names. However, Threat Fabric’s security researchers couldn’t find out how the hackers got their victims to go to these sites. In the past, I’ve seen hackers use phishing emails, random messages on social media and even fake ads to get people to click on links to their malicious sites.
If someone is foolish enough to sideload an adults-only version of TikTok onto their Android phone, what ends up getting installed is actually a malware dropper or third-party software installer. By tricking users into granting it the permission to install apps from unknown sources, the malware dropper is able to bypass Android’s built-in security protections. This is used to download and install the first payload, after which, the second payload and two more permissions are requested that are essential for hackers looking to commit on-device fraud: access to Accessibility services and Device Admin privilege.
Like other banking trojans, RatOn abuses Android’s Accessibility services to launch overlay attacks on an infected device. For those unfamiliar, these attacks involve hackers putting an overlay on top of popular banking and finance apps that is almost identical to a legitimate login screen. This way, the hackers can harvest a victim’s banking credentials to gain access to their accounts without their knowledge, as they just thought they were logging into one of their banking, finance or crypto wallet apps.
Get instant access to breaking news, the hottest reviews, great deals and helpful tips.
Another interesting thing cybercriminals deploying the RatOn malware can do is to use an overlay to make victims think their phone has been locked by hackers. Of course, to unlock it, they need to send over a large amount of money, just like with a ransomware attack. However, while their phone isn’t actually infected with ransomware, it is compromised by the RatOn banking trojan.
RatOn also requests access to read/write contacts and manage system settings to carry out its malicious activity. From there, a third payload is downloaded, which is actually the NFSkate malware Threat Fabric was initially looking into. By using a technique known as Ghost Tap, NFSkate can carry out NFC relay attacks and steal contactless payment info. However, with that malware strain, these attacks needed to be carried out in person within physical range of a targeted Android phone.
Now, with RatOn, this new malware can perform automated money transfers (ATS) by abusing Android’s Accessibility services. This means that hackers deploying this malware in their attacks can drain your financial accounts from anywhere in the world, as they don’t need to be in the same room with you.
How to stay safe from banking trojans
(Image credit: Google)
The good news here is that at the moment, RatOn is only being used to target Android users in the Czech Republic. However, like with any Android malware strain, that geographic location could just be a testing ground to make sure it works before the malware’s creators begin targeting Android phones in other countries like the U.S. or the U.K.
I’ll be keeping a close eye on RatOn and how this new Android malware strain develops, but in the meantime, here are a few tips and tricks to help keep your phone (and your bank account) safe from dangerous trojans.
For starters, you never want to sideload Android apps unless you absolutely have to. Instead, you want to download all of your new apps from official app stores like the Google Play Store and the Samsung Galaxy Store. Google will soon prevent users from sideloading altogether with the next version of Android, but for now, you should avoid doing so even if it seems like a convenient way to put new apps on your phone.
When it comes to new apps, you want to be very careful when installing them, as even good apps can go bad. This is why I highly recommend limiting the number of apps on your phone overall and then, if you find you haven’t used a particular app for quite some time, it’s best to just delete it.
To stay safe from malicious apps, you want to make sure that Google Play Protect is enabled on your phone. This free, built-in security software scans all of your existing apps, along with any new ones you download, for malware or other signs of malicious activity. For extra protection, you may also want to run one of the best Android antivirus apps alongside it.
Hackers aren’t slowing down anytime soon, and there are constantly new malware strains and banking trojans like RatOn you need to look out for. However, if you practice good cyber hygiene, avoid clicking on links from unknown senders and don’t sideload apps you’ve found on less-than-reputable sites, you should be safe.
Follow Tom’s Guide on Google News to get our up-to-date news, how-tos, and reviews in your feeds. Make sure to click the Follow button.
Google’s new redesign turns the Play Store from a plain app shop into a tailored entertainment and gaming hub that serves up what you actually care about.
The Apps tab now displays entertainment corners, seasonal spotlights, and curated content like trending shows, webcomics, and mobile dramas (rolling out globally after tests in India and Japan).
With Guided Search, you can type your goal — like “find a home” or “deck-building games” — and Play’s AI organizes the best options for you.
A single gamer profile now tracks stats and achievements across devices, and Gen AI Avatars let you show off your personality.
Google Play is getting a redesign built around personalization, and it’s more than just a fresh coat of paint.
Google announced today that the app store is shifting from a basic download hub to something closer to a personal entertainment and gaming companion, one that knows what you’re into and serves it up at the right moment.
First up, the Apps tab isn’t just apps anymore. It’s now a place to discover entertainment and seasonal content without digging. Google has been testing this idea — like India’s Cricket Hub and Japan’s Comics space — and is rolling it out globally.
The Play Store in Korea now has a dedicated entertainment corner loaded with mobile-friendly dramas, movies, and TV shows, while U.S. users can browse trending shows, webcomics, and bite-sized dramas right from the Apps tab.
Seasonal spotlights will pop up in an immersive format tailored to your tastes. And if you’re tired of guessing keywords, Guided Search lets you type what you’re after (“find a home” or “deck-building games”), and Play’s AI will do the sorting for you.
Gaming gets unified
Sidekick plus Gemini Live in Google Play Store (Image credit: Google)
Gaming also got a big overhaul. Google Play Games is now a one-stop shop: unified gamer profiles track your stats and achievements across devices, and a Gen AI Avatar lets you show off your style.
Play Points rewards are now woven across mobile and PC, and Google is kicking off Play Games Leagues on October 10 with Subway Surfers. You can compete for rewards and bragging rights until October 23.
Get the latest news from Android Central, your trusted companion in the world of Android
The new Sidekick overlay, powered by Gemini Live, gives in-game tips without making you alt-tab for a walkthrough. DeepMind has been training Sidekick to actually understand game context, and select players will get early access in the coming months.
PC gamers aren’t left out either, as Google Play Games on PC is out of beta with a catalog of more than 200,000 titles, including Mecha Break, Subnautica, and soon, Deep Rock Galactic Survivor.
The new You tab in Google Play Store (Image credit: Google)
Finally, the brand-new You tab ties it all together, including your subscriptions, rewards, audiobook picks, and in-progress content in one feed. The rollout starts this week in select Play Points markets, with more countries coming October 1.
OnePlus is placing new restrictions on bootloader unlocking.
It requires filling out an application form and limits the number of requests to one every 30 days.
Thankfully, these limitations only apply to Chinese users (so far) and only on devices running at least ColorOS 16 based on Android 16.
Android has evolved significantly in the last decade, and one noticeable shift has been in the decline of custom development in Android. Custom ROMs or mods are far less popular among users, and while one reason is the perception of finesse in Android skins, OEMs have been pulling support. Recently, Samsung placed roadblocks to bootloader unlocking, which is key to installing any custom mods or rooting an Android device, and another major phone brand — OnePlus — is placing additional hurdles.
OnePlus has announced a new system that limits who can unlock the bootloader on their phones. Stating reasons such as “data security” and an enhanced “system stability” (based on machine translation from Chinese), OnePlus has introduced a new procedure where anyone wanting to unlock the bootloader on their devices must first fill out an online request form for “Deep Testing.”
Besides filling out the application form, users must ensure that their devices are not associated with any operator plans or have special enterprise or government-specific builds running on them. OnePlus also notes that you can apply for bootloader unlocking only once in 30 days, which is still better than Xiaomi, which recently limited the number of requests to one per year.
Don’t want to miss the best from Android Authority?
However, the announcement offers some sense of relief, too. Firstly, these requirements are only applicable to users in China, as they will only be enforced when their devices are updated to ColorOS 16, which is based on Android 16. It does not guarantee OnePlus will not enforce the same measures worldwide, although the support page clarifies that these restrictions will not apply to previous versions of ColorOS. That will be beneficial for anyone wanting to breathe life into an older or unsupported OnePlus phone, though users with new phones are not likely to appreciate it.
OnePlus is also assuring users that simply unlocking the bootloader won’t void the phone’s warranty, so long as they can return the device to the original firmware. This has been the company’s stance for as long as anyone can remember.
Interestingly, this isn’t the first instance when OnePlus has placed restrictions on bootloader unlocking. More than six years ago, OnePlus mandated certain OnePlus 6T users in the US to fill out requests to unlock the bootloader, preventing them from doing it immediately. However, it was enforced only on devices bought in contract with T-Mobile, which made the application process mandatory.
Nonetheless, OnePlus’ restrictions, despite being limited to China, signal a shift in brands’ openness towards customization and third-party development for Android devices, and it is especially disconcerting coming from a brand that owes its initial success to the custom ROM community.
Thank you for being part of our community. Read our Comment Policy before posting.
Oh hey there! If you’re here, it must be time for Wordle. As always, we’re serving up our daily hints and tips to help you figure out today’s answer.
If you just want to be told today’s word, you can jump to the bottom of this article for today’s Wordle solution revealed. But if you’d rather solve it yourself, keep reading for some clues, tips, and strategies to assist you.
Originally created by engineer Josh Wardle as a gift for his partner, Wordle rapidly spread to become an international phenomenon, with thousands of people around the globe playing every day. Alternate Wordle versions created by fans also sprang up, including battle royale Squabble, music identification game Heardle, and variations like Dordle and Quordle that make you guess multiple words at once.
The best Wordle starting word is the one that speaks to you. But if you prefer to be strategic in your approach, we have a few ideas to help you pick a word that might help you find the solution faster. One tip is to select a word that includes at least two different vowels, plus some common consonants like S, T, R, or N.
Get your last guesses in now, because it’s your final chance to solve today’s Wordle before we reveal the solution.
Drumroll please!
The solution to today’s Wordle is…
FELON.
Don’t feel down if you didn’t manage to guess it this time. There will be a new Wordle for you to stretch your brain with tomorrow, and we’ll be back again to guide you with more helpful hints.
Reporting by Chance Townsend, Caitlin Welsh, Sam Haysom, Amanda Yeo, Shannon Connellan, Cecily Mauran, Mike Pearl, and Adam Rosenberg contributed to this article.
A new translation feature is rolling out to WhatsApp on iOS and Android, but the supported languages and features will be different on both platforms.
You can get real-time translation of your WhatsApp messages
Meta announced it’ll “gradually” roll out a new translation feature on WhatsApp for Android and iOS. You’ll be able to translate messages in one-to-one chats, groups, and Channels by long-pressing on them and tapping the “Translate” option. That should allow you to choose what language the message you want translated from or to. The company says that every translation is handled on-device, and WhatsApp cannot see the messages. That means your chats remain encrypted.
It’s not the same for everyone
Android users are getting a better version of the feature, albeit with fewer supported languages. Once they translate a message, they’ll have the option to turn on automatic translation for the entire thread and see translated versions of all future messages.
On the other hand, iPhone users will be able to use the feature in more languages. In total, WhatsApp on iOS will be able to translate messages between the 19 languages supported by Apple’s Translate app. Android users will be able to use translations in six languages:
English
Spanish
Hindi
Portuguese
Russian
Arabic
Meta’s new feature comes shortly after Apple launched Live Translation on its own Messages app on iOS 26. The feature works automatically while you type your messages, much like what Meta says Android users will be able to do on WhatsApp.
That’s what AI is all about, right?
I feel like we’re in the middle of an automated translation boom, and I love it. Learning languages can be fun, but it’s difficult, so having reliable translation tools at hand can make life much easier. Considering how many people around the world use WhatsApp, that feature could be even more consequential than the Live Translation on the AirPods Pro 3. I’ll definitely use it way more often.
“Iconic Phones” is coming this Fall!
Rediscover some of the most unique and memorable phones of the last two decades! “Iconic Phones” is a beautifully illustrated book that we’ve been working on for over a year – and it’s coming out in just a couple short month!
“Iconic Phones: Revolution at Your Fingertips” is a must-have coffee table book for every phone lover out there. Covering the stories of more than 20 fan-favorite phones, it takes you on a memorable journey through the technological revolution that shaped our lives. Sign up now to secure an early discount price!
Ilia, a tech journalist at PhoneArena, has been covering the mobile industry since 2011, with experience at outlets like Forbes Bulgaria. Passionate about smartphones, tablets, and consumer tech, he blends deep industry knowledge with a personal fascination that began with his first Nokia and Sony Ericsson devices. Originally from Bulgaria and now based in Lima, Peru, Ilia balances his tech obsessions with walking his dog, training at the gym, and slowly mastering Spanish.
If you rely on an older Android device, whether it’s a phone, tablet or car infotainment unit, you may soon lose access to all the new Waze features. Waze’s latest beta, version 5.9.90 and higher, now requires Android 10 as a minimum, up from the previous requirement of Android 8.
This change means that while your device may still run Waze, it will no longer receive updates. That applies to all the navigational improvements, bug fixes and new tools Waze typically rolls out every few months.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.
Older Android devices may not be able to download the latest Waze updates.(Waze)
Why Waze dropping Android 8 and 9 support matters
First, it’s important to note that Google Maps continues to support Android 8 and Android 9, offering a lifeline if you’re stuck on older software.
Still, Waze is a community-driven navigation leader. Its strength comes from real-time, crowdsourced reporting of incidents, police traps, road hazards and even gas prices, features that many drivers value above Google Maps.
Who loses Waze features on older Android devices
Drivers using older smartphones or tablets: If you haven’t updated your device to Android 10, you’ll lose access to new Waze features.
Users of aftermarket in-car infotainment systems: Many of these budget units still run Android 8 (Oreo) or Android 9 (Pie), meaning they’ll soon fall behind.
Devices that have not been updated to at least Android 10 will not be able to access Waze’s newest features.(Waze)
What Waze’s Android 10 requirement means for you
If Waze is your go-to navigation app, here’s what to keep in mind:
You can keep using Waze on older Android versions, but you won’t get new features or updates.
App reliability may decline over time as backend changes or server protocols evolve.
Map updates and basic reporting may still work for a while, but support isn’t guaranteed indefinitely.
Google Maps remains a fallback option, as it still supports older Android systems.
As a version of the app gets older, it may become less reliable over time.(Waze)
Tips to keep Waze working on your Android device
If you rely on Waze daily, here are some quick ways to stay ahead of the update cutoff:
Check your Android version: Go to Settings > About Phone > Software Information to confirm if you’re running Android 10 or higher.
Update your device: If your phone or tablet supports it, install the latest Android update to keep Waze fully functional.
Consider a budget upgrade: If your hardware is stuck on Android 9 or older, affordable Android 10+ phones and tablets are widely available.
Update car infotainment systems: Many aftermarket head units allow software updates. Check the manufacturer’s site to see if Android 10 is available.
Keep Google Maps as backup: If updating isn’t possible, Google Maps still works on Android 8 and 9, ensuring you’re never left without navigation.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right — and what needs improvement. Take my Quiz here: CyberGuy.com.
The shift to Android 10 reflects a common pattern in app development: focus on newer OS versions enables advanced features and stronger security. For most Android users, especially those on modern devices, this is a non-issue. But if you’re using older hardware, especially in your vehicle, you must plan ahead. To keep enjoying the full Waze experience, consider whether upgrading your device or switching to supported apps like Google Maps is the smarter move.
Will you upgrade your device to stay updated with Waze, or will this change push you to switch to Google Maps? Let us know by writing to us at CyberGuy.com.
Sign up for my FREE CyberGuy Report Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CyberGuy.com newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Kurt “CyberGuy” Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on “FOX & Friends.” Got a tech question? Get Kurt’s free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
Gboard, the default keyboard on most Android devices, is undoubtedly one of the best keyboard apps available on the world’s most popular mobile operating system. Now, it looks like Google is testing a bunch of new Gboard features, one of which is AI-powered writing tools.
According to a recent report by Android Authority, the latest Gboard beta has added a new “flick keys to enter symbols” feature, which, when enabled, allows users to quickly enter the symbol associated with a key by touching it and pulling it downwards. This is pretty similar to the Apple keyboard on iPads and might be hard to get used to, but it does make it easy to enter symbols once you get used to it.
With the resurgence of compact Android phones, Gboard is testing a new setting that lets you choose if you want the number row to show up when you are typing passwords. This isn’t helpful for those who have a big screen phone, but it does help save some screen space on new compact devices like the Pixel 9, Samsung Galaxy S25 and OnePlus 13s, to name a few.
Story continues below this ad
Google has been testing Writing Tools for Gboard for quite some time, and now, the tech giant is giving users the option to enter their own prompt, which will help them tell the AI what they want to do or generate new text.
Earlier this year, Google was spotted testing circular and pill-shaped keys for Gboard, sparking outrage amongst users. The tech giant now seems to be listening to the feedback and is making the feature optional by allowing users to choose the shape of the key background. One thing to note here is that these features are still in development and may take some time before they are available to everyone.
September 12, 2025: With this update, our lineup of recommended Antispyware software remains unchanged. The existing picks have been vetted for currency and availability.
Award-winning antivirus
Protects Windows, macOS, Android, and iOS devices
Online management and remote control
VPN, spam filter, and parental control
Vast number of additional bonus features
Full VPN access requires a separate subscription
Parental content filter not fully effective
Support for iOS is limited
Bitdefender Total Security is our Editors’ Choice pick for security mega-suite, in no small part due to its amazing breadth of features. Of course, it includes all the expected suite mainstays: award-winning antivirus protection, unobtrusive firewall, parental control, spam filtering, and so on. But it also boasts an extensive collection of spyware-fighting features.
Like IronVest, it actively puts an end to tracking systems that profile your online activity by embedding ads and other trackers in the web pages you visit. Its SafePay hardened browser isolates your financial transactions from interference using a separate desktop inaccessible to other processes. If an unauthorized program tries to peek through the webcam, Bitdefender offers to block it. Its file shredder lets you rub out all traces of sensitive files, foiling even spies with forensic recovery software. Don’t forget the privacy protection from its VPN (though you’ll have to pay extra for unlimited VPN features).
Sure, spyware is a worry, but maybe you’ve got enough worries already. Rather than taking the time to figure out separate spyware protection tools, you may prefer to pick an award-winning security suite with spyware protection baked in. That’s Bitdefender Total Security.
Protects and automates SMS passcode authentication
Manages passwords
Blocks tracking of your browsing activities
Local-only password storage can be lost if you don’t back up
Some minor rough edges
If you suspect spies are waiting outside your home to tail you, you might choose to go out in disguise. IronVest brings that concept to the modern world. When using it, you can shop online without revealing your email address, credit card, or phone number. The only thing you can’t mask is the address you use to receive your purchases.
As you surf the web, ads and other trackers on the pages you visit spy on your activities and conspire to build a profile they can sell. IronVest integrates with your browser to actively block those trackers. Its browser toolbar button displays the number of tracking spies on the current site and lets you fine-tune its blocking behavior.
Surfing the web is fun, and shopping online is convenient, but the idea that someone might be spying on your activities may sour you on the experience. Use IronVest to foil webpage spies and do your shopping without revealing your identity.
By itself, Norton 360 Deluxe is a PCMag Editors’ Choice pick for a cross-platform, multi-device security suite with a ton of features, including some aimed at fighting spyware. The addition of LifeLock makes it a powerful tool for detecting attempts to spy on your personal activities and steal your data. If someone gets access to your bank account, requests an illicit change of address, or misuses your SSN, Norton with LifeLock warns about it so you can quickly take action. And if the spies and hackers manage to steal your identity, your subscription entitles you to all the help it takes to put things right.
But Norton’s skills don’t stop there. A full-powered VPN protects your online communications against interference and spying. It includes a degree of data broker opt-out management offered by Privacy Bee and Optery. Sneaky peekers won’t get access to your webcam because Norton will warn you. It even puts your browser in isolation mode when you’re banking to prevent data theft.
You want it all, and you want it now. An award-winning security suite, comprehensive identity monitoring, expert help to recover if identity thieves strike, and an array of spyware-specific security components—that’s Norton for you.
Foils websites that track you using fingerprinting
Actively detects tracking attempts
Can clear cookies and other browser traces
Configures Windows for better privacy
Tracker blocking visible only in Chrome
No transparency regarding Windows privacy settings
Each time you visit a website, there’s a good chance you’ll trigger an ad or other tracker embedded in the site. Trackers on sites across the internet work together to build a profile. What kind of sites do you like? What do you buy? Where do you comment? They then sell these profiles to others, legitimate or shady. If you’d rather not be spied on by these trackers, check out Avast AntiTrack.
Old-fashioned trackers rely on browser cookies to link your various activities, and old-fashioned tracker blockers easily subvert this process. Persistent trackers invented a new technology called browser fingerprinting, which identifies you using a collection of data that any site can gather by querying your browser. Avast AntiTrack defeats fingerprinters by subtly varying the information your browser sends so you don’t have a consistent fingerprint. Of course, it also smacks down the old-fashioned trackers.
Whose business is it what you do on the internet? Nobody but yourself, right? With Avast AntiTrack, you can keep nosy spies out of your online activity.
No longer offers mobile management or keylogger protection
Advanced features require uncommon tech expertise
You probably have an idea or two to protect your own privacy from prying spies, but what will you do when your friends and family ask for help? Will they even be able to understand and follow your advice? With a Sophos Home Premium subscription, you can remotely manage up to 10 security software installations, including various spyware-specific components. If your low-tech best buddy screws something up, you can reach out and fix it without getting up from your chair. Tweak the configuration, check security status, run a scan—it’s all handled remotely.
Safe Browsing will sound the alarm any time a spyware app tries to break into your online financial transactions. If someone surreptitiously installs a keylogger on your system in hopes of capturing passwords, secrets, and anything else you type, the Keylogger Protection component ensures that they get gibberish instead. Sophos also warns you anytime a program accesses the webcam, though it doesn’t give you the option to allow or deny access the way several others do.
Everyone in your circle turns to you for tech help—you’re the tech hero! With Sophos Home Premium, you can keep them all safe from malware, spyware, ransomware, and other badware, all from the comfort of your tech lair.
Includes Pro editions of all current and future Avira tools
Protection for Windows, macOS, Android, and iOS devices
No-limits VPN
Cross-platform high scores from antivirus testing labs
Lacks many expected suite features
Dark Web Monitoring is available only in Germany
With most modern security suites, you automatically receive all updates during your subscription. Avira Prime goes a step further. This suite incorporates the premium version of every Avira product, even those that have yet to be released. And yes, quite a few of these components protect various forms of spying and spyware.
First, you get full, unfettered access to Avira’s VPN, not the limited version supplied with lesser Avira products. When your communications go through the VPN, nobody can spy on them, not even if the network itself is compromised. Speaking of the network, Avira’s Network Scanner lists all devices using your network, though it doesn’t check them for security problems or let you deny access to interlopers.
Other spy-fighting features include an active Do Not Track system to prevent ads and other trackers from profiling you; a secure deletion shredder that ensures a spy with forensic recovery software can’t retrieve files you meant to erase forever; and a device control system that can prevent data exfiltration via removable devices.
How would you feel if your security suite provider released a new type of security software but kept it separate from the suite? Avira Prime keeps you up with all the latest additions, including every Avira product, both existing and future.
Removes your data from hundreds of data broker sites
Risk assessment features are available for free
Reports data breach exposures
Active Do Not Track browser extension
Manages trust relationships with thousands of companies
Handles industry opt-outs such as junk mail
Email search function gives Privacy Bee full access to your email
Spy thriller novels would have you believe that intelligence agents are bold, dashing types who infiltrate enemy assets and exfiltrate intel. But in truth, plenty of agents work behind the scenes, sifting valuable data from public sources. They even have a name for it: OSINT, short for open-source intelligence. In the same way, data brokers don’t steal your personal info; they obtain it from legitimate sources and use it to build profiles that they can sell. If you ask them to remove your profile, the law says they must comply, but figuring out who to ask and how is tough. That’s where Privacy Bee comes in.
Privacy Bee checks a huge (and growing) list of data brokers and flags those holding your information. It then acts as your agent to get your data removed. If you’re willing to do the grunt work yourself, manually opting out of the brokers it finds, you don’t even have to pay for the service. Online spies can still steal your private data, but at least they won’t just receive your personal profile on a platter.
Some things about you and your activities are public information, whether you like it or not. A determined researcher can find out about you with some effort. Or a dedicated identity thief can buy your profile from a data broker. If you find that image maddening, Privacy Bee can help.
Your subscription has been confirmed. Keep an eye on your inbox!
The Best Antispyware Software for 2025 Compare Specs
Buying Guide: The Best Antispyware Software for 2025
What Is Spyware and How Does It Work?
Just what is spyware? The term covers a wide variety of sinister software—programs that can capture your passwords as you type, or spy on you through a webcam, or collect your personal data and send it to hacker HQ.
As the name implies, a keylogger keeps a log of all the keys you type, from personal messages to username and password combinations. If you have a keylogger running on your system, chances are good that some crooked individual planted it specifically to spy on you. The keylogger can even be a physical device installed between the keyboard and the PC.
We call them keyloggers, but these nasty programs log a ton of information in addition to keystrokes. Most capture screenshots, save the clipboard’s contents, note each program you run, and log every website you visit. The perp can use these various threads of information to, for example, match up a username and password you typed with the website you were visiting at the time. That’s a potent combination.
(Credit: PCMag)
As noted, a first-class malware protection utility should wipe out keyloggers, along with all other types of malware. However, some add another layer of protection, just in case a keylogger slips past. When this sort of protection is active, the keylogger typically receives random characters, or nothing at all, in place of your typing, and attempts at screen capture come up blank. Note, though, that other logging activities may not be blocked.
Of course, keylogger protection in software can’t prevent a hardware keylogger from capturing keystrokes. But what if you don’t even touch the keyboard? A virtual keyboard on the screen lets you enter your most sensitive data by clicking with the mouse. Some products go to extremes, scrambling the key locations or creating a flock of decoy cursors to foil screen-capture attacks. Virtual keyboards are often found in password manager tools, so you can enter the master password without fear of having it captured.
(Credit: Kaspersky/PCMag)
How Do Trojans Steal Your Data?
The historic Trojan horse looked innocuous enough to the soldiers of Troy that they brought it inside the city walls. Bad idea: Greek soldiers exited the horse in the night and conquered the Trojans. The malware type aptly named Trojan horse works in much the same way. It looks like a game, a utility, or a useful program of some kind, and it may even perform its promised function. But it also contains malicious code.
So, now that you’ve brought it inside your city walls, what can the Trojan horse do? The possibilities are vast, but I’ll focus on the ones designed to steal your personal data. They silently sift through your files and documents, seeking information to send back to malware HQ. Credit card details, social security numbers, passwords—the malware coder can monetize these and other kinds of personal information.
One way to foil this type of attack is to use encryption software to protect your most important files. Encryption is built into G Data Total Security and a few other security suites. Note, though, that it’s tough to find and encrypt every shred of personal data. It’s a good thing your antivirus usually whacks these nasties before they launch.
A variation on this theme is called a man-in-the-middle attack. All your internet traffic gets redirected through a malware component that captures and forwards your personal information. Some banking Trojans take this a step beyond, actually modifying the traffic they handle. For example, the Trojan might transfer $10,000 out of your account but strip that data from the activity log that you see.
You can prevent man-in-the-middle and other types of browser-based spying by using a hardened browser. Implementations vary from suite to suite. Some wrap your existing browser in added protective layers. Some offer a separate high-security browser. Some move your browsing to a secure desktop, entirely separate from the regular desktop. The smart ones automatically offer their secure browser when they see you’re about to visit a financial site.
(Credit: Bitdefender/PCMag)
Routing your traffic through a virtual private network (VPN) is another way to foil many kinds of browser-level spying. You can definitely use a VPN, along with your malware protection, for a suspenders-and-belt approach! More and more security suites are including a VPN component, though some charge extra for full functionality.
What if the worst happens, and an evildoer uses your personal information to steal your identity? Norton 360 With LifeLock detects identity theft attempts early and helps you recover from the effects of such an attack. It’s our Editors’ Choice among security suites that include identity theft protection.
How Do Advertisers Track Your Browsing Habits?
Have you noticed that when you look at a product on a shopping site, you see ads for it on other sites? Online advertisers really want to present ads that you might click on. To that end, they use various techniques to pin down your browsing habits. They don’t necessarily know your name or email address, but they do know “that guy who keeps shopping for Nevermore Academy action figures.”
Creepy, right? The good news is you can set your browser to tell every site you visit that you don’t want them tracking you. The bad news is that they can (and do) ignore that request.
(Credit: Avira/PCMag)
The ad networks that perform this kind of tracking are necessarily large. It’s not too hard to compile a list of them and actively block their tracking, or at least give the user the option to do so. This active Do Not Track functionality is sometimes paired with general-purpose ad blocking. Note, too, that using a secure browser or a VPN can help to throw off the trackers.
The most advanced trackers create a fingerprint by quizzing your browser about all kinds of details, fiddly stuff like what extensions are installed and even what fonts are available. The usual active Do Not Track implementations can’t help you against these. If you really, really hate the idea of having your online behavior tracked, consider giving Avast AntiTrack a try. This tool keeps tweaking the data that goes into your browser fingerprint so the trackers lose track of you.
Of course, sometimes you can’t avoid giving out your personal details, like giving your email address and credit card to a shopping site. The retailer may not be spying on you, but others can get hold of that data. Using a temporary email address tool like IronVest, you can shop online without giving out your actual email address or credit card. IronVest includes active Do Not Track, password management, and more.
What About Spyware That Uses Public Data?
Real-world espionage experts don’t spend all their time hiding behind potted plants or focusing binoculars on their targets. They can often gather an impressive dossier just by collating publicly available information. Spies call this OSINT, which stands for open-source intelligence. The same is true of data brokers and data aggregators. These snoops can assemble a thorough profile of you, your neighbor, your spouse or roommate, and just about anyone from public information.
These businesses have to obey the law, including the laws about removing your personal information from their files if you ask them. But how do you know to opt out when you don’t even know they have your profile?
(Credit: Optery/PCMag)
A growing army of privacy services has arisen to help. These services search dozens or even hundreds of data broker sites to find your information and then automate the process of opting you out. Optery and Privacy Bee are our current favorites in this realm. Privacy Bee handles over 900 brokers, more than any competitor. Optery verifies that your data has been removed and shows before and after screenshots as evidence. Both will search out your data for free if you’re willing to make the opt-out requests yourself.
What’s the Best Antispyware for Webcams?
That webcam on your laptop or all-in-one computer makes video conferencing super easy. You can tell when it’s active because of the little light next to it. Right? Well, no. There are varieties of malware that can turn on the webcam and peek at you without causing the light to reveal their activities.
Meta’s Mark Zuckerberg famously tapes over his webcam for privacy. If using tape seems déclassé, you can get a sliding webcam cover for just a few bucks. But with the right security software, you don’t need to cover the camera physically.
Products from Sophos and Norton include a component that monitors any program that tries to activate the webcam. Authorized programs, like your video conferencing tool, get easy access. But if an unknown program tries to peek through the camera, you get a warning and a chance to give the spyware a black eye.
Recommended by Our Editors
Do My Smart Devices Need Antispyware Software?
Your home network supports a collection of very visible computers and mobile devices. Behind the scenes, though, it also supports an even bigger collection of Internet of Things (IoT) devices. Connected espresso makers, washing machines, light bulbs—everything’s on the network these days. Toys, too. It’s cool that your child’s new doll can learn her name and converse realistically. It’s not so cool when it turns out that the doll is spying on you.
There are occasional instances, like the connected doll, where IoT devices deliberately collect data about you. But the lack of security in most connected devices is even more worrisome. Spending extra bucks to secure a smart light bulb makes no financial sense in some manufacturers’ eyes. The competitor who skips security can get to market faster and at a lower price. Ultimately, you may pay the cost for their negligence.
Any unsecured IoT device can potentially offer spies a view into your house and your habits. Ironically, hacked security cameras provide a lovely view for hackers. Even something as simple as a thermostat that adjusts the temperature when you’re home can reveal that you’ve gone on vacation.
You can’t go around installing antivirus software on each connected doorbell, refrigerator, and bathroom scale. The only way to truly secure these devices is to install a network security device like Firewalla. Without adding hardware, you can at least track what lives on your home network.
(Credit: Bitdefender)
Some security products now include variations on the theme of a network scanner. Features include verifying your network security settings, cataloging all devices on the network, and flagging devices that may be vulnerable to attack. If your antivirus or security suite includes this feature, take advantage of it and learn as much as possible.
How Does Antispyware Software Work?
The spyware protection features I’ve mentioned are important, but they’re not the only tools available. I mentioned encrypting your sensitive files. For maximum security, you must also use secure deletion to erase the originals beyond the possibility of forensic recovery. And yes, many antivirus and security suite products offer secure deletion.
If spyware does get a foothold on your PC, it can’t hoover up data that isn’t there. Many security products can clear traces of your browsing activity, general computer activity, or both. As a bonus, eliminating unnecessary files can free up disk space and may boost performance.
It’s unlikely that a spy would get physical access to your computer and copy sensitive documents to a USB drive—that happens only in movies. But if you have the slightest worry about that possibility, consider choosing a security suite that lets you ban the use of any USB drive that you haven’t previously authorized. G Data Total Security, ESET Home Security Premium, and Avira Prime are among the products that offer this kind of device control.
As I noted earlier, this article focuses on products that employ techniques aimed at different spyware types. It’s not about the best general-purpose security software. Ultimately, the most powerful tool you can apply to keep yourself safe from spyware is a top-of-the-line antivirus or security suite. These products handle all kinds of malware, including threats much tougher than mere spyware.