Header

Is your PC protected?

Don't be one of the millions that gets infected by a virus this year. Get protected by downloading f-secure today.

Keep your kids safe!

Don't let hackers compromise your children's safety. There is no substitute for good parenting, but we can make your job a little easier.

Secure your Identity!

The easiest way for a thief to steal your identity is through your computer. Make sure you're PC is safe and secure.

Safety Tip

E-Mail Attachements When possible, avoid e-mail attachments both when sending and receiving e-mail.

Global Internet Security Alerts


  • Application.BitCoinMiner
    Application.BitCoinMiner is a program that uses the computer's physical resources (memory, processing power, etc) to generate units of a virtual or digital cryptocurrency.
  • Trojan.PRForm.A
    This detection identifies compromised installers for the CCleaner utility program, which have been altered to include a backdoor that silently runs in the background when the affected installer is launched.
  • Trojan.Ransom.WannaCryptor
    Trojan.Ransom.WannaCryptor identifies the WannaCry ransomware, which encrypts the affected device and demands payment of a ransom to restore normal use. WannaCry is also known as Wanna Decryptor and WCryr.
  • Backdoor!Online
    This detection from the F-Secure Security Cloud identifies a file with behavior or characteristics that match known backdoors.

Virus Activity

The World Map is a visual tool for presenting geographically grouped summaries of known virus infections.

View up-to-date map »

Safety Tip

E-Mail Attachements Never open e-mail attachments with the file extensions VBS, SHS or PIF. These extensions are almost never used in normal attachments but they are frequently used by viruses and worms.

Security Terms

Distributed Denial of Service (DDoS)

A type of attack conducted over the Internet, using the combined resources of many computers to bombard, and frequently crash, a targeted computer system or resource (e.g., a program, website or network).

There are various types of Distributed Denial-of-Service (DDoS) attacks, which vary based on how the attack is conducted. DDoS attacks are often performed by botnets, as the combined resources of all the computers in the network can generate an terrific amount of data, enough to overwhelm most target's defenses within seconds.

An example of how a DDoS attack is conducted: an attacker will exploit a vulnerability in one computer system and make it the DDoS master using Remote Control Software. Later, the intruder will use the master system to identify and manage zombies that can perform the attack.

Parental Controls

Protect your children online with WOW! Security Parental controls. Click here to learn how.

Block channels or programs you don’t want your children viewing. Click here to learn how.

PC Health Toolbox

Protect with F-Secure

Get protected today with the best in anti-virus and anti-spyware from F-Secure.

Download F-Secure Now »

Web Videos

Play
 

Flash is required to view this content. Please install the Adobe Flash Player.