Data vs. Metadata
Ransomware Race (Part 4): Adult Content, Browlock's Staying Power
Ransomware Race (Part 3): SynoLocker Under The Hood
Timo Discusses Dynamic Analysis of Flash Files
Testing the Xiaomi RedMi 1S
Read more >>
ALS Ice Bucket Challenge: Mikko Hypponen, F-Secure - during a Thunderstorm!
More on FSLabs Channel >>
Latest Threat Descriptions created
Latest Mobile Threat Descriptions created
Latest Vulnerability report for popular programs
Scan and clean your PC
Detect and remove the Flashback trojan
CosmicDuke: Cosmu with a twist of MiniDuke
>> Read the full report
Submit suspected malicious files directly to our Labs for analysis
Submit spam or phishing samples suspected of miscategorization for analysis
Wondering if you can trust a website? Use Browsing Protection to see our security rating for the site
Submit reports of issues seen during Banking Protection-related online banking sessions
Protection for all your computers, smartphones and tablets with one simple solution.
Protects your computer from malware, spam and web-based threats
An easy way to ensure your Mac stays secure
Beta test updated versions of the scanning engines before public release
You are here: How To Articles
Keeping track of so many passwords can sometimes feel overwhelming. Here's a quick guide on how to make handling your passwords simpler. It doesn't have to be so troublesome though
A quick guide to Rogues - what they are, what they do and how to avoid being infected with a Rogue.
A quick guide to Detections - why they are important, how they work and how to read them. Also includes Generic Detections and how they differ from traditional Detections.
A quick guide to trojans - what they are, how they work and the potential consequences of a having a trojan unwittingly installed on your computer or smartphone.
A quick guide to computer worms - what they are, how they spread and the potential effects of having a worm infection.
A quick guide to computer viruses - what they are, how they work and the potential consequences of a virus entering and infecting your computer.
A quick introduction to botnets - what they are, how they work and the potential consequences of being unwittingly press-ganged into a botnet array.
Discover what Denial of Service (DoS) attacks are and how they work; how they can impact a user; and why they are considered a significant menace on the modern Internet.
Give advice. Get advice. Share the knowledge on our free discussion forum.