Header

Is your PC protected?

Don't be one of the millions that gets infected by a virus this year. Get protected by downloading f-secure today.

Keep your kids safe!

Don't let hackers compromise your children's safety. There is no substitute for good parenting, but we can make your job a little easier.

Secure your Identity!

The easiest way for a thief to steal your identity is through your computer. Make sure you're PC is safe and secure.

Safety Tip

E-Mail Attachements When possible, avoid e-mail attachments both when sending and receiving e-mail.

Global Internet Security Alerts


  • Trojan.Ransom.WannaCryptor
    Trojan.Ransom.WannaCryptor identifies the WannaCry ransomware, which encrypts the affected device and demands payment of a ransom to restore normal use. WannaCry is also known as Wanna Decryptor and WCryr.
  • Backdoor!Online
    This detection from the F-Secure Security Cloud identifies a file with behavior or characteristics that match known backdoors.
  • Trojan!Online
    This detection from the F-Secure Security Cloud identifies a file with behavior or characteristics that match known trojans.
  • Gen:Variant.Application.Bundler
    Gen:Variant.Application.Bundler identifies software that is distributed bundled together with other components or programs.

Virus Activity

The World Map is a visual tool for presenting geographically grouped summaries of known virus infections.

View up-to-date map »

Safety Tip

Show File Extensions Configure Windows to always show file extensions. In Windows 2000, this is done through Explorer via the Tools menu: Tools/Folder Options/View - and uncheck "Hide file extensions for known file types". This makes it more difficult to for a harmful file (such as an EXE or VBS) to masquerade as a harmless file (such as TXT or JPG).

Security Terms

Social Engineering

A general term used to describe attacks that leverage on psychological or social pressures to dupe an unsuspecting victim into providing sensitive information such as passwords, account details and so on.

Social engineering attacks can take place both online and offline. Online social engineering attacks usually take the form of phishing or pharming attempts. Examples of offline attacks include pretending to be a surveyor and asking people to provide their passwords in return for a prize; calling a company and pretending to be an employee to gain access to the company intranet; or leaving an infected disk in a position where someone is likely to pick it up and use it, thereby infecting their system.

Parental Controls

Protect your children online with WOW! Security Parental controls. Click here to learn how.

Block channels or programs you don’t want your children viewing. Click here to learn how.

PC Health Toolbox

Protect with F-Secure

Get protected today with the best in anti-virus and anti-spyware from F-Secure.

Download F-Secure Now »

Web Videos

Play
 

Flash is required to view this content. Please install the Adobe Flash Player.