Header

Is your PC protected?

Don't be one of the millions that gets infected by a virus this year. Get protected by downloading f-secure today.

Keep your kids safe!

Don't let hackers compromise your children's safety. There is no substitute for good parenting, but we can make your job a little easier.

Secure your Identity!

The easiest way for a thief to steal your identity is through your computer. Make sure you're PC is safe and secure.

Global Internet Security Alerts


  • Trojan-Downloader:JS/Locky
    Trojan-Downloader:JS/Locky is ransomware that encrypts files saved on the machine and demands payment of a ransom in order to obtain the decryption key needed to restore normal access to the affected files.
  • Trojan-Downloader:W97M/Dridex
    Trojan-Downloader:W97M/Dridex is a document file containing maliciously crafted macro code that, when allowed to run on a user's machine, drops a file onto the system. The dropped file attempts to contact a remote server.
  • Trojan.GenericKD.3016333
    Trojan.GenericKD.3016333 is ransomware that encrypts files stored on the affected device and demands payment of a ransom.
  • Trojan:W32/Nymaim
    Trojan:W32/Nymaim is ransomware that is also capable of downloading additional malware onto the affected device.

Virus Activity

The World Map is a visual tool for presenting geographically grouped summaries of known virus infections.

View up-to-date map »

Safety Tip

Worms Most of the worms which use e-mail to propagate use Microsoft Outlook or Outlook Express to spread. If you need to use Outlook, download and install the latest Outlook security patch from Microsoft. In general, keep your operating system and applications up-to-date and apply the latest patches when they become available. Be sure to get the updates directly from the vendor.

Security Terms

Hosts File

A list of IP addresses frequently accessed by the computer system and stored on the system itself. Each time a user enters an address in the web browser, the system will first check the host file for the address; otherwise, the system must perform an extra step and connect to the DNS service of the Internet Service Provider (ISP) in order to connect to the correct address.

Maintaining the host file allows the system to reduce the amount of processing required. Some malware are designed to attack the host file in order to hijack and redirect a web connection from the one desired, to a different and usually malicious site.

PC Health Toolbox

Protect with F-Secure

Get protected today with the best in anti-virus and anti-spyware from F-Secure.

Download Now

Web Videos

Play
 

Flash is required to view this content. Please install the Adobe Flash Player.