Find out


The latest research in threats and technology


NanHaiShu: RATing the South China Sea

This whitepaper details the malware being used by a threat actor to target government and private-sector organizations involved in a territorial dispute centered on the South...

Read more (PDF)


F-Secure DeepGuard

This whitepaper explains the trends and developments in computing that have made host-based behavioral analysis and exploit interception necessary elements of computer security and ...

Read more (PDF)


2015 Threat Report

In this report we summarize the main trends and incidents seen in 2015 that impacted computer and mobile security, as well as developments related to digital privacy.

Read more (PDF)

See more whitepapers

Descriptions & Removal

Threat Descriptions

The Threat Descriptions contain technical details about the threats detected by F-Secure products. Listed below are some of the most recently published Descriptions:

See More Descriptions

Removal Instructions

You can find general removal steps for removing an infection from your device, or check the Threat Description of a specific threat for more detailed instructions on handling it. You can also go to the F-Secure Community for further assistance, or the Online Help Center for product manuals and documentation.

Removing Police-Themed Ransomware

How to remove ransomware pretending to be writs from law enforcement

General Removal

A general guide for removing threats using your F-Secure product

More About

Product Security

Vulnerability Protection

Patches recently released by the vendors of popular programs to fix known vulnerabilities

Security Advisories

Fixes for all known vulnerabilities affecting F-Secure products

Zero-day fixes

Detections released by F-Secure to protect users against recent zero-day vulnerabilities

Digital Security


An A-Z guide to the technical terms used by Labs


More in-depth reads on popular topics about digital security


How F-Secure classifies threats