Is your PC protected?

Don't be one of the millions that gets infected by a virus this year. Get protected by downloading f-secure today.

Keep your kids safe!

Don't let hackers compromise your children's safety. There is no substitute for good parenting, but we can make your job a little easier.

Secure your Identity!

The easiest way for a thief to steal your identity is through your computer. Make sure you're PC is safe and secure.

Global Internet Security Alerts

  • Trojan:W32/BandarChor
    Trojan:W32/BandarChor is ransomware that steals control of the user's machine or data, then demands a payment from the user to restore normal access to the ransomed content or system.
  • Adware:W32/Superfish
    Adware:W32/Superfish is a program pre-installed on some Lenovo consumer laptop models that surreptitiously inserts advertisements into webpages by either injecting JavaScript into non-encrypted web traffic or, for encrypted traffic, by using a self-signed root certificate that misrepresents itself as the official certificate of the website being viewed.
  • CTB-Locker
    CTB-Locker is ransomware that encrypts files on the affected machine and demands payment in return for the decryption key needed to restore access to the files.
  • Exploit:SWF/CVE-2014-0515
    Exploit:SWF/CVE-2014-0515 is an exploit for the CVE-2014-8439 vulnerability found in unpatched versions of Adobe Flash Player.

Virus Activity

The World Map is a visual tool for presenting geographically grouped summaries of known virus infections.

View up-to-date map »

Safety Tip

Double-check If you feel that an e-mail you get from a friend is somehow strange - if it is in a foreign language or if it just says odd things, double-check with the friend before opening any attachments.

Security Terms


A type of social engineering attack in which a fraudulent website is used to trick a user into giving out their sensitive personal information, such as their banking or e-mail account details.

A pharming attack typically depends on "DNS poisoning", which involves seeding the user's hosts file or a DNS server with false information. In this case, the DNS poisoning tactic redirects users from a legitimate website to a copycat website under the attacker's control. Any information the user enters in the malicious website is then compromised.

A pharming attack may also be used in conjunction with a 'phishing' attempt. In this case, a misleading message leads the unsuspecting user to the malicious website.

Pharming is pronounced the same as "farming".

PC Health Toolbox

Protect with F-Secure

Get protected today with the best in anti-virus and anti-spyware from F-Secure.

Download Now

Web Videos


Flash is required to view this content. Please install the Adobe Flash Player.