Find out
More

Whitepapers

The latest research in threats and technology

100%x200

Callisto Group

Published Apr 2017

The Callisto Group threat actor's primary interest is gathering foreign and security policy intelligence. In early 2016, they began sending highly targeted phishing emails...

Read more (PDF)

100%x200

Ransomware

How to prevent, predict, detect & respond

Published Nov 2016

Ransomware is one of the most prominent cyber threats today. Yet just like any other threat...

Read more (PDF)

100%x200

NanHaiShu

RATing the South China Sea

Published Jul 2016

We detail the malware being used by a threat actor to target government and private-sector organizations involved in a territorial dispute centered on the South China Sea.

Read more (PDF)

See more whitepapers

Descriptions & Removal

Threat Descriptions

The Threat Descriptions contain technical details about the threats detected by F-Secure products. Listed below are some of the most recently published Descriptions:

See More Descriptions

Removal Instructions

You can find general removal steps for removing an infection from your device, or check the Threat Description of a specific threat for more detailed instructions on handling it. You can also go to the F-Secure Community for further assistance, or the Online Help Center for product manuals and documentation.

Removing Police-Themed Ransomware

How to remove ransomware pretending to be writs from law enforcement

General Removal
Instructions

A general guide for removing threats using your F-Secure product

More About

Product Security

Vulnerability Protection

Patches recently released by the vendors of popular programs to fix known vulnerabilities

Security Advisories

Fixes for all known vulnerabilities affecting F-Secure products

Zero-day fixes

Detections released by F-Secure to protect users against recent zero-day vulnerabilities

Digital Security

Terminology

An A-Z guide to the technical terms used by Labs

Articles

More in-depth reads on popular topics about digital security

Classification

How F-Secure classifies threats