BBC News: LulzSec Hacker Interview
LulzSec Sentencing in UK
Mac Spyware Found at Oslo Freedom Forum
Download: Mobile Threat Report Q1 2013
Read more >>
F-Secure's Mikko Hyppönen: Full talk from Wired 2012
More on FSLabs Channel >>
Latest Threat Descriptions created
Trojan-Dropper:OSX/Revir.D Backdoor:OSX/Imuler.B Exploit:W32/CVE-2011-3402.AExploit:Java/Majava.BExploit:W32/CVE-2010-0188.C
Latest Mobile Threat Descriptions created
Latest Vulnerability report for popular programs
Evaluate your computer's security and find updates
Threat Report H2 2012
>> Read the full report
Submit suspected malicious files directly to our Labs for analysis
Submit spam or phishing samples suspected of miscategorization for analysis
Wondering if you can trust a website? Use our Browsing Protection Portal to see our safety rating for the site
Submit reports of issues seen during Banking Protection-related online banking sessions
Keep viruses, identity thieves and hackers away
An easy way to ensure your Mac stays secure
Beta test updated versions of the scanning engines before public release
You are here: How To Articles
A quick guide to Rogues - what they are, what they do and how to avoid being infected with a Rogue.
A quick guide to Detections - why they are important, how they work and how to read them. Also includes Generic Detections and how they differ from traditional Detections.
A quick guide to trojans - what they are, how they work and the potential consequences of a having a trojan unwittingly installed on your computer or smartphone.
A quick guide to computer worms - what they are, how they spread and the potential effects of having a worm infection.
A quick guide to computer viruses - what they are, how they work and the potential consequences of a virus entering and infecting your computer.
A quick introduction to botnets - what they are, how they work and the potential consequences of being unwittingly press-ganged into a botnet array.
Discover what Denial of Service (DoS) attacks are and how they work; how they can impact a user; and why they are considered a significant menace on the modern Internet.
Give advice. Get advice. Share the knowledge on our free discussion forum.
Go to Community