Useful online security tips and articles

True cyber security combines advanced technology and best practice. Get tips and read articles on how to take your online security even further.

laptop screen with a ban symbol and text

Article

USA Kaspersky Ban 2024: Why Did It Happen – and What Now?

The US government issued a ban on Kaspersky products in USA in June 2024. Find out what the Kaspersky ban means for you.

Illustration of a hook in a heart and a patient's hand outstretched, illustrating US healthcare data breaches

Article

US healthcare data breaches: why do they want patient data?

Patient data is a valuable commodity. Learn what's exposed, how hackers use data, and how to protect yours.

Illustration demonstrating Netflix scams: the Netflix logo with a phishing hook in it.

Article

7 Sneaky Netflix Scams to Protect Your Netflix Account From

Discover the latest Netflix scams: from hacked smart TVs and subscription expiry scams to fake Netflix jobs.

Illustration of the Facebook logo with phishing hooks coming out of it, symbolizing Facebook Messenger scams.

Article

How to Stop Facebook Messenger Scams & Boost Security

Learn how to identify and protect yourself from scam messages and fake accounts on Facebook Messenger.

Illustration of a robotic arm holding a phone and making unwanted illegal robocalls

Article

Robocalls 101: Are Auto Calls Illegal & How Do You Stop Them?

AI robocalls are now banned in the US – but will this deter scammers? Here’s how you can block spam calls.

Illustration of a man experiencing a wealth of scams

Article

5 Scam Statistics That You Need to Know in 2024

F-Secure’s latest Living Secure survey reveals increases in cyber scams and concerns about online safety. Here are the top 5 insights.

Diagram illustrating a steep increase in scam threats

Article

New F-Secure Survey Reveals Increasing Scam Threat

The 2024 Living Secure survey found that online worries are still prevalent, with technology like generative AI making scams harder to spot.

Living Secure 2024 cover image

Article

Living Secure 2024 reveals an increase in scams as threats evolve

How do people really feel about their digital security in 2024? Our survey of 7,000 people globally reveals all.

Illustration of a man sitting in a dinghy with an ice cream, taking a selfie

Article

F-Alert Report: 2024 Summer Cyber Security Tips & Online Threats

WhatsApp imposters. Real-time deepfakes. Discover your summer cyber survival toolkit in our F-Alert.

Illustration of a hand holding a phone with a QR code that says 'Scam!' above it, with the Olympics logo in the background

Article

From the 2024 Olympics to the Euros, Watch Out for Ticket Scams

With exciting events fast approaching, it's a summer for sports fans – but it's also prime time for scammers.

person with device and text pwned

Article

Have I been pwned? 4 steps to take if your email has been compromised

If your email has been pwned, your personal information is in danger. This article guides you on what to do next.

LinkedIn fake profiles

Article

Is LinkedIn safe? How to spot fake profiles and secure your account in 2024

LinkedIn scams are on the rise. Find out how to spot LinkedIn fake profiles and how to secure your account.

Illustration of a scammer reaching out of a laptop to steal an ID card

Article

Identity Theft Scams: Why Do Criminals Want Your Personal Data?

From credit card to loan and lease fraud, we explain how criminals steal your identity and what they do with it.

Illustration of a hook luring social media logos

Article

How 62% of Social Media Phishing Actors Lure You with Facebook

Criminals love to use Facebook as a lure for phishing attacks – watch out for these common scam tactics.

person holding phone with uncertainty around whether text messages are spam

Article

SMS Spam or a Genuine Gift from Amazon, Apple or McDonald’s?

SMS spam. It's everyone's pet hate – but it may not be forever. Here’s the future of spam prevention.

Lookout app icon changing to the new Lookout Life by F-Secure app icon

Article

Lookout’s consumer business is now Lookout Life by F-Secure

We’ve combined forces with F-Secure to protect digital lives everywhere.

Phone with LinkedIn app and ID being stolen

Article

Job scams on LinkedIn: what are they and how to stay protected

With over 900 million people worldwide using LinkedIn, the platform has become the primary service for job seekers looking to discover career and networking opportunities.

Phone with warning sign on display and warning messages

Article

Is my phone hacked? Here’s how you can tell and what to do

Phones are lucrative targets of attacks because they hold so much valuable information stored in a single place, such as private or financial information.

Close up of phone showing the Instagram app

Article

Instagram scams and how to avoid them

Instagram is one of the most popular social media platforms in the world. More than 1.3 billion people use Instagram, with the average user spending 30 minutes per day.

Man surrounded by spam text bubbles patting head

Article

I clicked on a link in a spam text: now what?

If you own a smartphone or computer, you likely are familiar with spam messages. “Spam” refers to unsolicited messages sent in bulk, most often via email or text messages.

Closeup of phone screen showing Facebook app

Article

Facebook Marketplace scams: how to identify and avoid them

As Facebook Marketplace has grown in popularity, Facebook Marketplace scams are also rising.

Phone showing a scam call and danger

Article

F-Secure study identifies an ongoing consumer scam surge

To shed light on the world of digital scams, we commissioned a survey that spoke to 1,000 U.S. consumers to understand where (and how frequently) people encounter scams, whether they have fallen victim to scammers, and the associated impact.

Phone showing cash app logo with money stolen

Article

12 Cash App scams to know and how to avoid them

Cash App makes it easy to receive and send money and is renowned for its convenience. These transactions are generally safe, but users could still be susceptible to scams.

Confused person holding phone with warning sign

Article

8 signs your phone has a virus & what to do about it

While phone viruses are less common than computer viruses, they certainly exist, and iPhones or Android devices are both susceptible to risks.

woman browsing social media on laptop illustration

Article

3 clever social media scams and how to avoid them

From TikTok trends to Facebook shopping scams, learn how criminals use social media to their advantage.

robot detecting scams on devices illustration

Article

5 scam detector & prevention tools to keep AI scammers at bay

From checking text messages to analyzing online shops, find the tools you need to stay safe online — for free.

scammers hiding in tall coat at ATM illustration

Article

How to dodge banking scams like the “Phantom Hacker”

Banks across the world have issued warnings about a rise in scam attempts. Here’s how you can avoid them.

2024 spy

Article

2024 is the year of the scam — and this is why

In this article, F-Secure Threat Intelligence Lead, Laura Kankaala, explores the emerging significance of scams today, and the value of protecting our digital lives against them.

AI bot

Article

Artificial intelligence in everyday life

A look at the beginning of a revolution that will transform technology and, possibly, humanity. 

man receiving fake sms illustration

Article

Trending fake SMS: scam text messages you should ignore

From fake failed deliveries to bank impersonations, these are the scam text messages to keep an eye out for.

having cyber security issues illustration

Article

Top 5 cyber security threats right now

We deep-dive into five of the biggest cyber threats over the past year and explain how you can stay ahead.

online shopping scams illustration

Article

Valentine’s Day to Black Friday scams: how to spot fake deals

Online shopping is a year-round activity; scammers use these common tactics to successfully take our cash.

hacker stealing accounts online

Article

F-Alert Report: Global Scams & Cyber Threats in April 2024

Scammers steal faces with AI. Click farms manipulate algorithms. Discover the latest scams in our F-Alert.

F-Alert Report: cyber threats in March 2024

Article

F-Alert Report: cyber threats in March 2024

The largest known data leak. AI voice cloning scams personalized to victims. Discover the latest threats here.

F-Alert: February Threat Report

Article

F-Alert: February Threat Report

In this F-Alert, we look at how the world’s AI leader is handling new security threats. Plus you’ll find out how you can improve your privacy, secure your accounts and spot the latest scams.

Is identity theft protection worth it?

Article

Ask an expert: is identity theft protection worth it?

Is identity theft protection worth it? F-Secure expert Olli Bliss discusses online identity theft and how best to protect against it.

How to spot and avoid PayPal scams

Article

How to spot and avoid PayPal scams

Is PayPal safe to use for your online shopping? Read more and avoid common PayPal scams.

What is spear-phishing?

Article

What is a spear phishing attack?

Spear phishing attacks can cause great damage to both individuals and organizations. Read more to stop phishing scams.

Can my WhatsApp account get hacked?

Article

Can my WhatsApp account get hacked?

Just like other accounts, your WhatsApp can get hacked and fall into the wrong hands. Here’s how to protect your WhatsApp account from hackers.

VPN for iPhone

Article

VPN for iPhone

iPhones are known to be safe to use and less prone to malware than Android devices. You still need a VPN for iPhone for true privacy on the internet.

What is spoofing?

Article

What is spoofing?

Online criminals and scammers use spoofing to deceive you. Learn to identify a spoofing attack to protect your information online.

How AI scam calls work

Article

How AI scam calls work

Online criminals have weaponized artificial intelligence to scam their victims. AI voice scams and fake calls are one malicious form of cyber crime.

Why your every pass­word matters

Article

Why your every password matters

A leaked password endangers your personal information and can lead to online identity theft. Read more to find out why your every password matters.

Why do hackers want your personal information

Article

Why do hackers want your personal information?

Billions of records of personal information are stolen every year in data breaches. But why do hackers want the data? Why is it a threat to you? Find out here.

What is vishing?

Article

What is vishing?

Vishing is a specific type of phishing attack used to steal your personal information and money on the phone. Read more and learn to spot a vishing scam.

What is two-factor authentication?

Article

What is two-factor authentication?

Two-factor authentication (2FA) improves your online security and prevents hackers from accessing your accounts. Read more about 2FA.

What is spyware

Article

What is spyware?

Spyware collects information on you without your consent. Read more about spyware and how you can avoid spyware on your computer and mobile.

What is social engineering?

Article

What is social engineering?

Social engineering attacks exploit the weakest point of people’s personal cyber security — the user itself. Read more and avoid social engineering.

What is smishing

Article

What is smishing?

Text messages can be a risk to your personal information and financial details too. Learn more about smishing and how to protect yourself against it.

What is phishing

Article

What is phishing?

What is phishing and how can you protect yourself from it? What are the different forms of phishing attacks? Read more to keep yourself protected.

What is malware?

Article

What is malware?

Malware is a serious online threat for both individuals and large organizations. Learn how to detect and defend against malicious software.

What is identity theft?

Article

What is identity theft? Everything you need to know

What is identity theft? In this guide you’ll discover how to protect yourself, how to spot breaches, and what to do if your data is exposed.

What are disinformation and misinformation?

Article

What are disinformation and misinformation?

Look out for disinformation, misinformation and fake news on the internet. Read more and spot incorrect information.

A denial-of-service attack is like an internet traffic jam

Article

What is a distributed denial of service attack (DDoS)?

Do you know how a distributed denial of service attack works? Or what is the difference between a DoS and DDoS attack? Read more!

What is cyber security?

Article

What is cyber security?

Cyber security is becoming more and more important as the dangers lurking on the internet continue to grow. Read more about cyber security!

What is a VPN

Article

What is a VPN?

Want more control over your online privacy? Do you know the dangers of a free VPN service? Read on to find out how a secure VPN can help.

What is a Trojan

Article

What is a Trojan?

A computer Trojan is a virus in disguise. Trojans trick you into letting them into your device. Read more about the Trojan horse virus.

What is a ransomware attack

Article

What is a ransomware attack?

Find out what ransomware is all about. We give you five tips on how you can prevent becoming a victim. Read more and stay protected.

What is a data breach

Article

What is a data breach?

Data breaches can lead to identity theft and other harm. Do you know what to do in case of a data leak? Read more and keep your personal data safe.

Cyber attack

Article

What is a cyber attack?

Cyber attacks by hackers and state-sponsored actors are a growing threat. Read more about different types of cyber attacks with examples.

What is a computer virus?

Article

What is a computer virus?

Computer viruses are malware that can have many nasty side effects if they infect your device. Read how to stop computer viruses.

VPN for PC

Article

VPN for PC

With a VPN you browse online privately and securely wherever you are. Read more to find the best VPN software for your Windows PC.

Two‑factor authentication (2FA) or a strong pass­word?

Article

Two‑factor authentication or a strong password

Most online services now offer two‑factor authentication (2FA). As a result, some people no longer see the need for a strong password. But is this the right approach?

The social and gaming platforms most popular for phishing in 2023

Article

The social and gaming platforms most popular for phishing in 2023

Discover how phishing scammers are turning to social and gaming platforms. Learn how to identify scams and avoid becoming victims of this increasingly prevalent threat.

The parent’s guide to keeping kids safe online

Article

The parent’s guide to keeping kids safe online

A big part of your children’s lives happens online. These tips for parents will help your kids enjoy the internet more safely.

The expert guide to safe shopping and avoiding fake websites in 2024

Article

The expert guide to safe shopping and avoiding fake websites in 2024

F‑Secure experts deliver the ultimate guide to safe shopping and avoiding fake websites.

The best antivirus for gaming

Article

The best antivirus for gaming

The best antivirus for PC gaming protects your device from online threats without affecting its speed. Read more about gaming-related online threats!

Staying ahead of cyber threats in the age of AI

Article

Staying ahead of cyber threats in the age of AI

Artificial intelligence (AI) is already changing life as we know it, and many experts are comparing it to the biggest technological advancement since the internet. Download your free ebook today and find out how to stay ahead of cyber threats in the age of AI.

What is spam?

Article

What is spam?

Spam emails can be a real threat. Learn how to identify spam messages and what you can do to prevent junk mail from flooding your inbox.

Small business cyber security checklist

Article

Small business cyber security checklist

Small businesses need cyber security. This small business cyber security checklist helps you choose the right measures to protect your small office/home office.

Screen time and kids

Article

Screen time and kids

Why is it that free security doesn’t cost you money? The hard truth is that free apps often come with a catch: they might sell your data. Read more.

Parental control makes internet safe for kids

Article

Parental control makes internet safe for kids

Parental control gives you the tools to protect your children online. It’s how you can make internet safe for kids and ensure their wellbeing online. Read more!

No pride without privacy

Article

No pride without privacy

Even data collection with best intentions puts LGBTQ+ internet users at risk. Read more in this article.

Mobile malware

Article

Mobile malware

Just like computers, mobile devices are susceptible to malware. Read more about mobile malware and keeping your devices safe.

Living Secure report

Article

Living Secure: discover the digital moments that matter in 2023

The Living Secure survey collects insight from 7,000 people, in selected regions around the world, enabling us to create a comprehensive overview of digital moments in 2023.

Is this webshop safe?

Article

Is this webshop safe? 4 easy ways to check website safety

F‑Secure experts reveal why you need to look beyond the lock icon when it comes to checking ecommerce security.

Is public Wi‑Fi safe

Article

Is public Wi‑Fi safe?

Is public Wi‑Fi safe? How to increase public Wi‑Fi safety? This article by F‑Secure answers these questions and gives you simple safety tips. Read more here!

Is online dating safe?

Article

“Is online dating safe?” Discover 5 activities that lead to internet dangers

Discover 5 activities that lead to internet dangers and learn how to spot and avoid the most common cyber threats associated with them.

LGBTQ+ people deserve privacy

Article

LGBTQ+ people deserve privacy

Pride month offers an annual reminder that even data collection with best intentions presents unique risks for LGBTQ+ internet users.

A denial-of-service attack is like an internet traffic jam

Article

A denial-of-service attack is like an internet traffic jam

An attacker takes down a website by blocking the path with a massive amount of web traffic. Find out how you can stop hackers from using your device in these attacks.

Identity theft is not a joke

Article

“Identity theft is not a joke, Jim!” How can I protect my sensitive data online?

“Identity theft is not a joke, Jim!” By following these 7 simple steps you can ensure that you are protected against the financial and emotional impact of identity theft.

How to spot scam websites on Black Friday and Cyber Monday

Article

How to spot scam websites on Black Friday and Cyber Monday

Discover how to spot scam websites this Black Friday and Cyber Monday with advice and tips from F‑Secure’s team of cyber security specialists.

How to report a scam website fast

Article

How to report a scam website fast

Discover how to report a scam website as we reveal five ways to blow the whistle on cyber criminals.

How to remove a virus on Android phone

Article

How to remove a virus on Android phone

Viruses and malware for Android exist. This guide explains how to remove virus from your Android device.

How to protect your phone from hackers

Article

How to protect your phone from hackers

Mobile devices need protection just like computers do. How to protect your phone and tablet from hackers? Read extensive mobile security guide by F‑Secure here!

How to keep your money safe when shopping online

Article

How to keep your money safe online

Get started with safe online shopping with this article. Learn to avoid online scams and find out how to keep your money safe online. Read more

How to go incognito and browse in private

Article

How to go incognito and browse in private

Going incognito with private browsing makes it harder to track you online. But who is tracking you online? And how can you stop it? Read here to find out!

How to get rid of a virus?

Article

How to get rid of a virus?

Removing computer viruses is not easy without the right tools. Read how to spot and get rid of viruses on your device.

How to change IP address

Article

How to change IP address

Change your IP address location to unlock more internet and protect your privacy. Here’s how you change your IP. Read more!

How account takeover happens

Article

How account takeover happens

Account takeover can lead to online identity theft and cause financial damage. Find out how account takeover happens, and how to protect yourself.

Free VPN

Article

Free VPN

A free VPN is tempting but can slow down your Internet and jeopardize your privacy. Use our guide to assess whether a free VPN is the best option for you.

Free antivirus

Article

Free antivirus

A free antivirus may sound tempting but is not always a safe way to protect your devices. Read how to stay safe using reliable antivirus software.

What is a firewall?

Article

What is a firewall?

A firewall is an additional layer of protection online. Read more about the different types and uses of a firewall.

Article

F‑Alert: End of year report

In this supersized edition of F‑Alert, we look back at the biggest cyber security news and forward to see how the New Year could transform both the internet and reality itself.

Article

F‑Alert October 2023

Find how criminals use QR codes. See why Google wants you to forget your passwords. And learn why most shopping scams start with Facebook ads. All this and more in this month’s F‑Alert.

Article

F‑Alert September 2023

See which cyber threats you’re most likely to face. Find out why the Dark Web is so confusing, and profitable. And learn why cyber criminals love LinkedIn. All this and more in this month’s F‑Alert.

Article

F‑Alert August 2023

Learn about an “uncensored” app that reveals the risks of malicious AI. See how Google is fighting stalking via Apple AirTags and the latest threats news in this month’s F-Alert.

Article

F‑Alert June 2023

Learn what employees should do when the companies they work for are breached. Get the lowdown on why you can’t take Apple security for granted. All in the summer edition of F‑Alert.

Article

F‑Alert May 2023

See how Google is trying to replace passwords. Find out how to identify fake images generated by AI. And much more in the latest edition.

generative AI

Article

F‑Alert April 2023

Find out about the take­down of one of the biggest criminal market­places on the web. Discover how AI can be used to scam you. And much more in the latest edition.

Article

F‑Alert March 2023

Find out how parents may pay when criminals target gamers. Discover how “pig butchering” scams break hearts and empty bank accounts. And much more in the latest edition.

Article

F-Alert February 2023

Learn how scammers targeted Valentine’s Day. Discover the impact of the latest Reddit data breach. And much more in the latest edition.

Article

F-Alert January 2023

Learn how scammers are targeting Instagram influencers. Discover the impact of the latest Twitter data breach. And much more in the latest edition.

Article

F-Alert December 2022

In this edition we review the security implications of AI tools like ChatGPT, we chart the rise of dark web marketplaces, and we reveal a new TikTok exploit.

Article

F-Alert November 2022

In this report, we’ll offer a crisp look at the cyber security news you need to know along with insights and advice from the experts in the F‑Secure Labs.

Article

F‑Alert — Discover the latest cyber security news and insights

Get the all-new monthly threats report. Featuring the latest cyber security news and insight.

Does my device have a virus

Article

Does my device have a virus?

Do you think your device has a virus, but aren’t sure? Look for these signs. Here’s how you can tell if your device has a virus or malware.

Do Macs, iPhones and iPads need anti­virus

Article

Do Macs, iPhones and iPads need antivirus?

Do Macs, iPads and iPhones need antivirus or other security apps? What threats exist for these devices?

Discover the top types of malware for 2023

Article

Discover the top types of malware for 2023

There are many types of malware that can affect you. In this post we reveal the top malware threats for consumers and explain how to protect against them.

What is the dark web?

Article

What is the dark web?

The dark web is an anonymous part of the internet that is often used by online criminals and hackers. Read more about the dark and deep web.

What are cookies?

Article

What are cookies?

Website cookies collect data about your online activity. Read more about how cookies and data collection affect your privacy online.

What is a computer worm?

Article

What is a computer worm?

Computer worms are a type of malware that spreads by replicating itself. Read how to spot a computer worm and stay protected.

Can my home Wi‑Fi be hacked

Article

Can my home Wi‑Fi be hacked?

If you’re worried about the security of your home network, read the tips from cyber security company F‑Secure and prevent hackers from accessing your network.

Best VPN 2024

Article

Best VPN 2024

Choose the best VPN 2024 for you with this expert VPN guide. Find out what’s essential and what’s not in picking the best VPN 2024.

Test results are in: F‑Secure 40 – Ransomware 0

Article

The result is in: F‑Secure 40 — Ransomware 0

F‑Secure Internet Security scored full points in AV-TEST’s Advanced Threat Protection tests. It’s proven to keep you safe against advanced threats. Read more!

What is an antivirus?

Article

What is an antivirus?

Antivirus software is essential for protecting your computer and mobile devices from viruses and other online threats.

Anti­virus for Android

Article

Antivirus for Android

Using premium antivirus software is vital for protecting Android devices from viruses and other malware. Learn how to improve your mobile security.

AI on handheld device

Article

F-Secured: Your complete guide to online security in 2024

The annual F-Secured Threats Guide offers a complete look at threats to online security in 2024.

Article

F‑Secured: your free 38-page guide to online security in 2023

The F‑Secured guide provides a comprehensive overview of the cyber security threats facing consumers in 2023, featuring insight and advice from F‑Secure experts.

8 cyber security tips for remote work

Article

8 cyber security tips for remote work

Cyber security for remote work is not an impossible challenge. This article by F‑Secure guides you into secure remote work with 8 easy tips. Read more!

7 things to teach your kids about internet safety

Article

7 things to teach your kids about internet safety

Internet safety for kids starts with awareness. Teach your children safe online behavior with these seven tips.

7 reasons why F‑Secure Total is better than free antivirus

Article

7 reasons why F‑Secure Total is better than free antivirus

Why is it that free security doesn’t cost you money? The hard truth is that free apps often come with a catch: they might sell your data. Read more.

6 things to consider when choosing a VPN

Article

6 things to consider when choosing a VPN

VPN guards your security and privacy online. Read these 6 tips to find a VPN you can trust from the hundreds of options out there.

6 malware tips to protect you and your family

Article

6 malware tips to protect you and your family

By following these simple malware tips you can ensure that you and your family remain protected from the growing collection of malicious cyber threats.

5 ways to minimize your risks after a data breach alert

Article

5 ways to minimize your risks after a data breach alert

Discover the steps you should take to prevent ID theft and other online crimes when you find out you’ve been the victim of a data breach.

5 ways privacy protection benefits you

Article

5 ways privacy protection benefits you

Privacy protection has many benefits in addition to protecting online privacy. This article guides you into making most out of privacy protection. Read more!

5 tips on how to stay safe online

Article

5 tips on how to stay safe online

Want to stay safe online? With all its good sides, the internet is also full of threats. Here are five simple tips on how to stay safe online. Read more now!

5 quick and easy ways to avoid identity theft

Article

5 quick and easy ways to avoid identity theft

Discover how you can avoid the stress and financial impact of identity theft by following 5 quick and easy steps.

5 phishing scams to avoid in 2023

Article

5 phishing scams to avoid in 2023

Phishing scams are one of today’s biggest online threats. In this post we reveal five classic phishing scams, showing you how to spot and avoid them.

5 fast and free ways to boost your safety online

Article

5 fast and free ways to boost your safety online

Did you know you can improve your online safety also for free? These 5 tips help you improve safety online fast and free.

4 things Tinder knows about you

Article

4 things Tinder knows about you

Discover what the dating app Tinder knows about you and how criminals can use your data to improve their scams and cyber attacks.

4 sneaky online shopping scams

Article

4 sneaky online shopping scams

Online shopping scams are getting more convincing. These expert tips reveal what to look out for when establishing whether a retailer is legit or not.

4 tips on what to do after a data breach

Article

4 practical tips on what to do after a data breach

4 practical tips on what to do after a data breach. In the event of a data breach simply follow these steps to keep your information and identity secure.

3 trending cyber threats in 2023

Article

3 trending cyber threats in 2023

Cyber threats are always evolving and can be difficult to spot. In this post we reveal three of the year’s most prevalent cyber threats.

3 expert tips on how to master your pass­words for good

Article

3 expert tips on how to master your password for good

There’s more to a secure password than meets the eye. Discover three tips from security experts that will enhance your password protection.

10 must-know tips for safe online shopping

Article

10 must-know tips for safe online shopping

Discover 10 cyber security tips for safe online shopping that will take the stress out of buying goods and services on the web.