Is your PC protected?

Don't be one of the millions that gets infected by a virus this year. Get protected by downloading f-secure today.

Keep your kids safe!

Don't let hackers compromise your children's safety. There is no substitute for good parenting, but we can make your job a little easier.

Secure your Identity!

The easiest way for a thief to steal your identity is through your computer. Make sure you're PC is safe and secure.

Global Internet Security Alerts

  • Backdoor!Online
    This detection from the F-Secure Security Cloud identifies a file with behavior or characteristics that match known backdoors.
  • Trojan!Online
    This detection from the F-Secure Security Cloud identifies a file with behavior or characteristics that match known trojans.
  • Gen:Variant.Application.Bundler
    Gen:Variant.Application.Bundler identifies software that is distributed bundled together with other components or programs.
  • Trojan.Phishing
    Phishing trojans are files that are designed to look legitimate, but are really delivery vehicles for malware. The trojans are usually distributed as file attachments to email messages which are crafted to look legitimate. If the file is opened, embedded code will either drop and install malware onto the user's device, or will download malware from a remote site to install on the device.

Virus Activity

The World Map is a visual tool for presenting geographically grouped summaries of known virus infections.

View up-to-date map »

Safety Tip

Beware of Strangers Never accept attachments from strangers in online chat systems such as IRC, ICQ or AOL Instant Messenger.

Security Terms

SQL Injection

A type of attack that targets improperly configured Structured Query Language (SQL) databases. SQL databases are a common feature of most modern interactive websites.

An SQL injection attack involves exploiting poor user-input filtering to inject and run executable commands in the database. Technically, a few types of SQL injection attacks are possible, but the end result of all successful SQL injection attacks is that an attacker can manipulate or even gain total control over the database.

PC Health Toolbox

Protect with F-Secure

Get protected today with the best in anti-virus and anti-spyware from F-Secure.

Download Now

Web Videos


Flash is required to view this content. Please install the Adobe Flash Player.