Is your PC protected?

Don't be one of the millions that gets infected by a virus this year. Get protected by downloading f-secure today.

Keep your kids safe!

Don't let hackers compromise your children's safety. There is no substitute for good parenting, but we can make your job a little easier.

Secure your Identity!

The easiest way for a thief to steal your identity is through your computer. Make sure you're PC is safe and secure.

Safety Tip

E-Mail Attachements When possible, avoid e-mail attachments both when sending and receiving e-mail.

Global Internet Security Alerts

  • Backdoor!Online
    This detection from the F-Secure Security Cloud identifies a file with behavior or characteristics that match known backdoors.
  • Trojan!Online
    This detection from the F-Secure Security Cloud identifies a file with behavior or characteristics that match known trojans.
  • Gen:Variant.Application.Bundler
    Gen:Variant.Application.Bundler identifies software that is distributed bundled together with other components or programs.
  • Trojan.Phishing
    Phishing trojans are files that are designed to look legitimate, but are really delivery vehicles for malware. The trojans are usually distributed as file attachments to email messages which are crafted to look legitimate. If the file is opened, embedded code will either drop and install malware onto the user's device, or will download malware from a remote site to install on the device.

Virus Activity

The World Map is a visual tool for presenting geographically grouped summaries of known virus infections.

View up-to-date map »

Safety Tip

Worms Most of the worms which use e-mail to propagate use Microsoft Outlook or Outlook Express to spread. If you need to use Outlook, download and install the latest Outlook security patch from Microsoft. In general, keep your operating system and applications up-to-date and apply the latest patches when they become available. Be sure to get the updates directly from the vendor.

Security Terms


A type of social engineering attack in which a fraudulent website is used to trick a user into giving out their sensitive personal information, such as their banking or e-mail account details.

A pharming attack typically depends on "DNS poisoning", which involves seeding the user's hosts file or a DNS server with false information. In this case, the DNS poisoning tactic redirects users from a legitimate website to a copycat website under the attacker's control. Any information the user enters in the malicious website is then compromised.

A pharming attack may also be used in conjunction with a 'phishing' attempt. In this case, a misleading message leads the unsuspecting user to the malicious website.

Pharming is pronounced the same as "farming".

Parental Controls

Protect your children online with WOW! Security Parental controls. Click here to learn how.

Block channels or programs you don’t want your children viewing. Click here to learn how.

PC Health Toolbox

Protect with F-Secure

Get protected today with the best in anti-virus and anti-spyware from F-Secure.

Download F-Secure Now »

Web Videos


Flash is required to view this content. Please install the Adobe Flash Player.