Is your PC protected?

Don't be one of the millions that gets infected by a virus this year. Get protected by downloading f-secure today.

Keep your kids safe!

Don't let hackers compromise your children's safety. There is no substitute for good parenting, but we can make your job a little easier.

Secure your Identity!

The easiest way for a thief to steal your identity is through your computer. Make sure you're PC is safe and secure.

Global Internet Security Alerts

  • Backdoor:OSX/Iworm
    Backdoor:OSX/Iworm connects affected Mac OS X machines to a botnet and is capable of executing a range of commands. At the time of writing, there have been no reports of the Iworm botnet being used for malicious activities.
  • Backdoor:W32/BlackEnergy
    Backdoor:W32/BlackEnergy is a crimeware toolkit that has been modified for use in information gathering in advanced persistent threat (APT) atttacks.
  • Backdoor:Linux/Shellshock.A
    Backdoor:Linux/Shellshock.A identifies files that attempt to exploit the CVE-2014-6271 vulnerability reported in Bash software. If successfully exploited, this vulnerability could allow remote attackers to execute code on the affected system. This vulnerability affects Unix-based operating systems, including Linux and Mac OS X.
  • Trojan-Spy:W32/FinSpy.A
    Trojan-Spy:W32/FinSpy.A is a component of a commercial surveillance product that monitors user activity. Variants of FinSpy also exist on other platforms.

Virus Activity

The World Map is a visual tool for presenting geographically grouped summaries of known virus infections.

View up-to-date map »

Safety Tip

Worms Most of the worms which use e-mail to propagate use Microsoft Outlook or Outlook Express to spread. If you need to use Outlook, download and install the latest Outlook security patch from Microsoft. In general, keep your operating system and applications up-to-date and apply the latest patches when they become available. Be sure to get the updates directly from the vendor.

Security Terms

Denial of Service (DoS)

A type of attack conducted over the Internet, in which a massive amount of data is sent to a targeted computer system or resource (e.g., a program, website or network), with the aim of overwhelming and crashing it.

A Denial of Service (DoS) attack is typically conducted by a single, or small group of, computer systems and can be performed in a variety of ways. Even if a DOS attack does not result in the target totally crashing, so much resources may have been diverted to deal with the attack that performance is significantly degraded, or other users are unable to use the system or resource until the attack has ended.

PC Health Toolbox

Protect with F-Secure

Get protected today with the best in anti-virus and anti-spyware from F-Secure.

Download Now

Web Videos


Flash is required to view this content. Please install the Adobe Flash Player.