The F-Secure Theater Group and Sean Sullivan have put together a quick look at F-Secure Internet Security 2011. Check it out and we hope you’ll see why we’re so excited about the latest version of our award-winning software. It was made just for you.

When you’re done with the video, you can try the beta version of Internet Security 2011 for free and get your chance to win an iPod touch. We look forward to protecting you.

Cheers,

Sandra

July 2014

Screen Shot 2014-07-02 at 4.29.36 PM

3 questions about the future of cyber warfare

“We’re not creative enough when we imagine cyber warfare,” F-Secure…

8 days ago

June 2014

ID-100209464

Right to be forgotten – good or bad?

Have you ever Binged or Googled for your own name,…

15 days ago
Screen Shot 2014-06-24 at 4.28.26 PM

5 things you need to know about malware that takes your files hostage

1. Online criminals are using our sense of shame to rob…

17 days ago
Screen Shot 2014-06-23 at 4.07.40 PM

11 ways to stay SAFE online when you’re traveling

If you bring your phone, tablet or laptop with you…

17 days ago
2710_fsecure-freedome_2297

How to teleport around the world using your mobile phone

While Finland is known for being the first country in the…

18 days ago
Digital Freedom

Our fundamental human rights are being violated

We are worried about our digital freedom and need your…

22 days ago
Screen Shot 2014-06-17 at 8.44.57 AM

3 free ways to stop Facebook from tracking you all over the web

“Privacy activists, you may start shouting… now,” Gizmodo‘s Jamie Condliffe wrote last week….

24 days ago
Screen Shot 2014-06-09 at 4.41.02 PM

Help shut down a massive crimeware botnet with one click — while you can

F-Secure is proud to be part of the global effort…

more than a month ago
Screen Shot 2014-06-03 at 8.10.58 PM

Are your terrible passwords guessable?

The #Heartbleed vulnerability got people thinking about passwords — a…

more than a month ago
mikko_republica_b

Why Edward Snowden Gives Me Hope

Exactly one year ago today, we saw the very first…

more than a month ago

Guest post by James Mowery

An ATM skimming device is used by crooks to steal a person’s bank card information and pin number when a victim uses a targeted ATM. And while they are rarely used, you should always be on the look out for this threat to your financial security.

There are usually two pieces to the thief’s equipment. One involves the skimming device itself, which can be very hard to spot. The ATM skimming device is usually designed to look like it belongs on the machine and is fitted over the actual card reader slot.

While some skimmers are much bulkier than the real card reader, others are extremely slim and barely noticeable. Some people will jiggle a card slot reader to see if it is loose or comes off before using an ATM.

Once you enter your ATM card into one of these skimmers, it will capture your card’s information, which will allow a thief to create a fake card with your information on it.

The second part of the ATM skimming equipment is a device or camera to capture a victim’s pin number. A strategically placed camera is the most commonly used device.

Tiny cameras can be hidden almost anywhere on the ATM machine and are very hard to spot. The most common location for a camera is affixed to the inside of the top of the machine so that it is looking down onto the keypad. In this manner, the camera can capture images of the victims’ pin numbers as they punch them in. However, a camera can be located almost anywhere on the machine where it will have a good view of the keypad.

Occasionally, a more sophisticated skimming device will actually capture the numbers, usually by means of a false keypad that can electronically capture the numbers.

For more information on how to detect ATM skimmers, check out this slideshow:

About the author: James Mowery is a computer geek that writes about technology and related topics. To read more blog posts by him, go to monitors.

CC image by Angus Fraser

June 2014

ID-100209464

Right to be forgotten – good or bad?

Have you ever Binged or Googled for your own name,…

15 days ago
Screen Shot 2014-06-24 at 4.28.26 PM

5 things you need to know about malware that takes your files hostage

1. Online criminals are using our sense of shame to rob…

17 days ago
Screen Shot 2014-06-23 at 4.07.40 PM

11 ways to stay SAFE online when you’re traveling

If you bring your phone, tablet or laptop with you…

17 days ago
2710_fsecure-freedome_2297

How to teleport around the world using your mobile phone

While Finland is known for being the first country in the…

18 days ago
Digital Freedom

Our fundamental human rights are being violated

We are worried about our digital freedom and need your…

22 days ago
Screen Shot 2014-06-17 at 8.44.57 AM

3 free ways to stop Facebook from tracking you all over the web

“Privacy activists, you may start shouting… now,” Gizmodo‘s Jamie Condliffe wrote last week….

24 days ago
Screen Shot 2014-06-09 at 4.41.02 PM

Help shut down a massive crimeware botnet with one click — while you can

F-Secure is proud to be part of the global effort…

more than a month ago
Screen Shot 2014-06-03 at 8.10.58 PM

Are your terrible passwords guessable?

The #Heartbleed vulnerability got people thinking about passwords — a…

more than a month ago
mikko_republica_b

Why Edward Snowden Gives Me Hope

Exactly one year ago today, we saw the very first…

more than a month ago

July 2014

Screen Shot 2014-07-02 at 4.29.36 PM

3 questions about the future of cyber warfare

“We’re not creative enough when we imagine cyber warfare,” F-Secure…

8 days ago

If you use Twitter, you probably love it. (If you don’t use Twitter, I recommend you go to Monitter.com and enter some search terms to see how stimulating the real-time web can be.) However, the more you tweet, the more your account gets cluttered.

After a few months, most users use too many applications, follow too many people and can’t keep up with the constant stream of information. Don’t fret. With a bit of effort, you’ll be back enjoying Twitter just as much as you used to.

Clean up your application connections

Twitter has been progressively tightening its login features to improve security. However, many users don’t realize that that once you allow an application access to you Twitter account, that access is open until you shut it off. This can lead to potential security holes, especially if you’ve authorized applications you shouldn’t trust.

What you should do now:
1. Log in to Twitter and go to ‘Settings’ then ’Connections’.
2. Go through and ‘Revoke Access’ to every application you aren’t using. (If it turns out that you are actually using it, don’t worry. You can always reestablish access.)
3. Remember to Google any application before you give it access to your account.

Clean up who you’re following

I know, you want to want to be like @TopTweets. You want to follow everyone. Unfortunately, that will make your Twitter stream more like a Twitter tsunami. The fact is some people aren’t worth following. Some  tweet too much, or too little. They may not Tweet at all–most users don’t, according to site statistics. Or you may just be following bots endlessly spitting out advice on how to get more followers. And since there’s no built-in tool to easily sort your followers, weeding out the users you’ve lost interest in can be time consuming.

What you should do now:
1. Log in to Twitter.
2. Try out ManageFlitter
3. Manage your followers.

You can unfollow those users who are too “talkative” or “quiet” or just plain inactive. You can see who’s following you back and see who hasn’t added a profile image, which is usually a sign of a neglected account, or limited creativity.

Clean up your Twitter stream

Even after you clean up your followers, you may still have hundreds of people in your stream. I understand. There are tons of interesting people on Twitter. And Twitter users in general tend to be active, interesting individuals who are engaged with life. So how can you make your Twitter stream digestible? Third-party dashboards like TweetDeck and HootSuite are powerful programs that offer real-time searches, groups and other filtering and collaboration tools. Twitter has also built a powerful tool right into the service—lists. It’s pretty self explanatory, but just case you’re interested here’s how it works.

What you should do now:
1. Log in Twitter.
2. On the sidebar, find ‘New List’
3. Create a list subject like ‘Newsbreakers’ or ‘Security Sources’.
4. As you see Tweets that fit the subject of the list, click on the user’s profile and add the account to your list.
5. Repeat as needed.
6. When you’re on Twitter via a web browser, click on your list you’re interested in and see what’s new.

Now you’ve got a Twitter account that’s even more useful. If you’re looking for tips on how to be safe and secure on Twitter, check out How To Tweet Safely.

Got any Twitter tips to add? Comment here or message us @FSecure.

Till next time,

Jason



July 2014

Screen Shot 2014-07-02 at 4.29.36 PM

3 questions about the future of cyber warfare

“We’re not creative enough when we imagine cyber warfare,” F-Secure…

8 days ago

June 2014

ID-100209464

Right to be forgotten – good or bad?

Have you ever Binged or Googled for your own name,…

15 days ago
Screen Shot 2014-06-24 at 4.28.26 PM

5 things you need to know about malware that takes your files hostage

1. Online criminals are using our sense of shame to rob…

17 days ago
Screen Shot 2014-06-23 at 4.07.40 PM

11 ways to stay SAFE online when you’re traveling

If you bring your phone, tablet or laptop with you…

17 days ago
2710_fsecure-freedome_2297

How to teleport around the world using your mobile phone

While Finland is known for being the first country in the…

18 days ago
Digital Freedom

Our fundamental human rights are being violated

We are worried about our digital freedom and need your…

22 days ago
Screen Shot 2014-06-17 at 8.44.57 AM

3 free ways to stop Facebook from tracking you all over the web

“Privacy activists, you may start shouting… now,” Gizmodo‘s Jamie Condliffe wrote last week….

24 days ago
Screen Shot 2014-06-09 at 4.41.02 PM

Help shut down a massive crimeware botnet with one click — while you can

F-Secure is proud to be part of the global effort…

more than a month ago
Screen Shot 2014-06-03 at 8.10.58 PM

Are your terrible passwords guessable?

The #Heartbleed vulnerability got people thinking about passwords — a…

more than a month ago
mikko_republica_b

Why Edward Snowden Gives Me Hope

Exactly one year ago today, we saw the very first…

more than a month ago


F-Secure’s Chief Research Officer Mikko H. Hyppönen appeared on CrossTalk to discuss international espionage in the Internet age. In a wide-ranging discussion about online terrorism and high-tech spying, Mikko expanded the discussion to include the global epidemic of cybercrime and concerns about a proposed “Internet kill switch”.

The whole program runs just over 25 minutes and is well worth your time.

June 2014

ID-100209464

Right to be forgotten – good or bad?

Have you ever Binged or Googled for your own name,…

15 days ago
Screen Shot 2014-06-24 at 4.28.26 PM

5 things you need to know about malware that takes your files hostage

1. Online criminals are using our sense of shame to rob…

17 days ago
Screen Shot 2014-06-23 at 4.07.40 PM

11 ways to stay SAFE online when you’re traveling

If you bring your phone, tablet or laptop with you…

17 days ago
2710_fsecure-freedome_2297

How to teleport around the world using your mobile phone

While Finland is known for being the first country in the…

18 days ago
Digital Freedom

Our fundamental human rights are being violated

We are worried about our digital freedom and need your…

22 days ago
Screen Shot 2014-06-17 at 8.44.57 AM

3 free ways to stop Facebook from tracking you all over the web

“Privacy activists, you may start shouting… now,” Gizmodo‘s Jamie Condliffe wrote last week….

24 days ago
Screen Shot 2014-06-09 at 4.41.02 PM

Help shut down a massive crimeware botnet with one click — while you can

F-Secure is proud to be part of the global effort…

more than a month ago
Screen Shot 2014-06-03 at 8.10.58 PM

Are your terrible passwords guessable?

The #Heartbleed vulnerability got people thinking about passwords — a…

more than a month ago
mikko_republica_b

Why Edward Snowden Gives Me Hope

Exactly one year ago today, we saw the very first…

more than a month ago

July 2014

Screen Shot 2014-07-02 at 4.29.36 PM

3 questions about the future of cyber warfare

“We’re not creative enough when we imagine cyber warfare,” F-Secure…

8 days ago

We really want to know what you think of our preview version of F-Secure Internet Security 2011. That’s why we’re inviting you try this beta version of latest and greatest security suite for free.

SORRY. THE BETA PROGRAM IS CLOSED. But you can still try F-Secure for free.

And if 6 months of total protection for your PC isn’t enough, we have more.

Introducing the Beta Challenge

After you try out our 2011 beta, we hope you’ll come back and tell us what you think with a comment on this post. When you do, you’ll be entered for your chance to win an iPod touch 8GB for you and an F-Secure Security Bundle of Internet Security and Online Backup for you and 2 friends.

We’ll also recognize those people who go above and beyond with detailed commentary, screenshots or videos of the beta in action with licenses to F-Secure products.

Can’t run F-Secure Internet Security 2011 on your computer? You can still enter. Just comment on this page and tell us what you’re looking for in Internet security.

So let your friends know that they can get free security and a chance to win. The Beta Challenge ends on August 16, 2010.

UPDATE: Thank you to everyone who entered, and congratulations to our winner, Lauri.

Cheers,

Sandra

CC image credit: Gonzalo Baeza Hernández

July 2014

Screen Shot 2014-07-02 at 4.29.36 PM

3 questions about the future of cyber warfare

“We’re not creative enough when we imagine cyber warfare,” F-Secure…

8 days ago

June 2014

ID-100209464

Right to be forgotten – good or bad?

Have you ever Binged or Googled for your own name,…

15 days ago
Screen Shot 2014-06-24 at 4.28.26 PM

5 things you need to know about malware that takes your files hostage

1. Online criminals are using our sense of shame to rob…

17 days ago
Screen Shot 2014-06-23 at 4.07.40 PM

11 ways to stay SAFE online when you’re traveling

If you bring your phone, tablet or laptop with you…

17 days ago
2710_fsecure-freedome_2297

How to teleport around the world using your mobile phone

While Finland is known for being the first country in the…

18 days ago
Digital Freedom

Our fundamental human rights are being violated

We are worried about our digital freedom and need your…

22 days ago
Screen Shot 2014-06-17 at 8.44.57 AM

3 free ways to stop Facebook from tracking you all over the web

“Privacy activists, you may start shouting… now,” Gizmodo‘s Jamie Condliffe wrote last week….

24 days ago
Screen Shot 2014-06-09 at 4.41.02 PM

Help shut down a massive crimeware botnet with one click — while you can

F-Secure is proud to be part of the global effort…

more than a month ago
Screen Shot 2014-06-03 at 8.10.58 PM

Are your terrible passwords guessable?

The #Heartbleed vulnerability got people thinking about passwords — a…

more than a month ago
mikko_republica_b

Why Edward Snowden Gives Me Hope

Exactly one year ago today, we saw the very first…

more than a month ago

For a long time, I had an old, basic mobile phone, good for the occasional call or text message. There was no software available for backing up my phone on my PC, and I would write all my contact numbers in a physical address book in case I ever lost my phone.

Now I have a smartphone and I am still adjusting to it. It is my calendar, my notebook, my dictaphone, my camera and I even use it for making the occasional call. It seems like smartphones have replaced at least 15 different devices.

I have it backed up. However, I don’t explore its features the way I would if I were placed in front of a personal computer. I’ve been holding back.

I hate to say it, but I even held back with exploring my F-Secure security settings. I’ve been an exploratory computer user for years, poking around just to ‘see what happens’ and trusting that no serious or irreversible side-effects will occur. Yet with my phone I  held back until a few weeks ago when, in anticipation of our new and improved Mobile Security offering, which is now available for Android, I finally took the time to explore the settings.

I’d known my firewall and anti-virus updates were up and running, which is another reason why exploring had not been so urgent for me. What I had not activated were the anti-theft settings. The best bit! Phones get lost, damaged and stolen far more often than they suffer virus attacks right now. In the future this is bound to change, but for now I think it’s a good idea to ensure you have your anti-theft settings in place.

I opened the anti-theft settings in my own phone and looked at the screen telling me about the locking and wiping functions. The idea was simple, great even. All I had to do was read a few lines of explanation to find that my phone would only lock if I sent a special text message, and I could even wipe the SIM card if I knew for sure that it had been stolen. There was no default pass code to look up in a manual, I could set it myself first time and give it a pass code that no-one could guess but me.

I enabled the Anti-Theft on my mobile phone in no time at all and it was easy.

F-Secure Anti-Theft also has a “Locate” feature. If I ever lose my phone I know exactly what to do to find it: I just text #locate#<and my pass code here> to my own number.

I’m so keen to try it that I might have to hide my phone somewhere and test it out.

June 2014

ID-100209464

Right to be forgotten – good or bad?

Have you ever Binged or Googled for your own name,…

15 days ago
Screen Shot 2014-06-24 at 4.28.26 PM

5 things you need to know about malware that takes your files hostage

1. Online criminals are using our sense of shame to rob…

17 days ago
Screen Shot 2014-06-23 at 4.07.40 PM

11 ways to stay SAFE online when you’re traveling

If you bring your phone, tablet or laptop with you…

17 days ago
2710_fsecure-freedome_2297

How to teleport around the world using your mobile phone

While Finland is known for being the first country in the…

18 days ago
Digital Freedom

Our fundamental human rights are being violated

We are worried about our digital freedom and need your…

22 days ago
Screen Shot 2014-06-17 at 8.44.57 AM

3 free ways to stop Facebook from tracking you all over the web

“Privacy activists, you may start shouting… now,” Gizmodo‘s Jamie Condliffe wrote last week….

24 days ago
Screen Shot 2014-06-09 at 4.41.02 PM

Help shut down a massive crimeware botnet with one click — while you can

F-Secure is proud to be part of the global effort…

more than a month ago
Screen Shot 2014-06-03 at 8.10.58 PM

Are your terrible passwords guessable?

The #Heartbleed vulnerability got people thinking about passwords — a…

more than a month ago
mikko_republica_b

Why Edward Snowden Gives Me Hope

Exactly one year ago today, we saw the very first…

more than a month ago

July 2014

Screen Shot 2014-07-02 at 4.29.36 PM

3 questions about the future of cyber warfare

“We’re not creative enough when we imagine cyber warfare,” F-Secure…

8 days ago

Since Twitter first became popular enough to attract crooks and scammers, phishing has been a consistent problem.

Generally, Twitter phishing looks like this: First, you get a direct message linking you to some site for some reason. Next, you login into this third-party site using your Twitter credentials. Finally, everyone in your Twitter stream gets sent the same message you got spreading the scam into infinity.

These scams were enabled by the fact that Twitter users have grown comfortable logging into other sites and tools using their Twitter credentials. This is because, in an effort to make its service more useful, Twitter has had a very open policy for third-party developers.

Thankfully, most of these scams have not result into much direct harm for users. Sean in the F-Secure Labs suggested that the main purpose of phishing was to create trending topics/trending terms to improve SEO attacks.

Back in April, I suggested a draconian way of avoiding Twitter phishing: never click on any links. Thankfully, that became less necessary as Twitter’s increasingly effective filtering of shortened links has helped to minimize these attacks.

And here comes a real change for the better.  As of August 16, 2010, you will not be able to use your login and password to login into Twitter using any site but Twitter.com. Any third-party site that you want to use has to connect to your Twitter account directly using the OAuth procedure.

This means Twitter can say to the world, don’t log into Twitter unless you’re on Twitter. And if users listen, Twitter phishing will be history. Just a little change, but a step in the right direction.

@FSecure regularly tweets about Twitter safety using the hashtag #twittersafety. You can also read our How to Tweet Safely: 6 Tips for Safer Tweeting.

Cheers,

Jason

Image by Carrot  Creative.

Carrot Creative

July 2014

Screen Shot 2014-07-02 at 4.29.36 PM

3 questions about the future of cyber warfare

“We’re not creative enough when we imagine cyber warfare,” F-Secure…

8 days ago

June 2014

ID-100209464

Right to be forgotten – good or bad?

Have you ever Binged or Googled for your own name,…

15 days ago
Screen Shot 2014-06-24 at 4.28.26 PM

5 things you need to know about malware that takes your files hostage

1. Online criminals are using our sense of shame to rob…

17 days ago
Screen Shot 2014-06-23 at 4.07.40 PM

11 ways to stay SAFE online when you’re traveling

If you bring your phone, tablet or laptop with you…

17 days ago
2710_fsecure-freedome_2297

How to teleport around the world using your mobile phone

While Finland is known for being the first country in the…

18 days ago
Digital Freedom

Our fundamental human rights are being violated

We are worried about our digital freedom and need your…

22 days ago
Screen Shot 2014-06-17 at 8.44.57 AM

3 free ways to stop Facebook from tracking you all over the web

“Privacy activists, you may start shouting… now,” Gizmodo‘s Jamie Condliffe wrote last week….

24 days ago
Screen Shot 2014-06-09 at 4.41.02 PM

Help shut down a massive crimeware botnet with one click — while you can

F-Secure is proud to be part of the global effort…

more than a month ago
Screen Shot 2014-06-03 at 8.10.58 PM

Are your terrible passwords guessable?

The #Heartbleed vulnerability got people thinking about passwords — a…

more than a month ago
mikko_republica_b

Why Edward Snowden Gives Me Hope

Exactly one year ago today, we saw the very first…

more than a month ago

In my last post I raised the issue of cyberstalking. Even if the situation is somewhat difficult from the legal perspective, the Finnish police, for instance, is doing a magnificent job in making its presence know in social media.

On Facebook they are being active on their own page, talking about their regular activities, participating and getting a  discussion started. They are also present on a Finnish web service, IRC-galleria, a web service where especially youngsters upload pictures and comment on them. Three brave police officers have created profiles to help out those who might have been bullied and and in general to be available for those in need of advice. I think this is a great approach and example on how authorities can provide help and reach out to us in the places where we actually go.

However, there are things you can do to make sure you don’t even need to contact the police. Here are my tips for dos and don’ts for Facebook.

1. Never ever insult anybody in your status update, on your wall or any other posts. This is what could happen to you. In the worst case, you might end up in a lawsuit for offending someone.

2. When posting photos, always, ALWAYS, check it is ok for the persons in the picture. You wouldn’t want your friend, or even worse, you yourself ending up on a after a hilarious bar night out with friends.

3. Everything you publish on Facebook, every status update, every wall post, every like, every group you join, will be logged and remembered in the future. So think twice – what do you want people to know about you in 20 years. And think twice about which people you want to have as your friends.

4. Be sure to protect your privacy. Read more on how in Jason’s blogpost.

Cheers,
Gia

Image by César  Astudillo

June 2014

ID-100209464

Right to be forgotten – good or bad?

Have you ever Binged or Googled for your own name,…

15 days ago
Screen Shot 2014-06-24 at 4.28.26 PM

5 things you need to know about malware that takes your files hostage

1. Online criminals are using our sense of shame to rob…

17 days ago
Screen Shot 2014-06-23 at 4.07.40 PM

11 ways to stay SAFE online when you’re traveling

If you bring your phone, tablet or laptop with you…

17 days ago
2710_fsecure-freedome_2297

How to teleport around the world using your mobile phone

While Finland is known for being the first country in the…

18 days ago
Digital Freedom

Our fundamental human rights are being violated

We are worried about our digital freedom and need your…

22 days ago
Screen Shot 2014-06-17 at 8.44.57 AM

3 free ways to stop Facebook from tracking you all over the web

“Privacy activists, you may start shouting… now,” Gizmodo‘s Jamie Condliffe wrote last week….

24 days ago
Screen Shot 2014-06-09 at 4.41.02 PM

Help shut down a massive crimeware botnet with one click — while you can

F-Secure is proud to be part of the global effort…

more than a month ago
Screen Shot 2014-06-03 at 8.10.58 PM

Are your terrible passwords guessable?

The #Heartbleed vulnerability got people thinking about passwords — a…

more than a month ago
mikko_republica_b

Why Edward Snowden Gives Me Hope

Exactly one year ago today, we saw the very first…

more than a month ago

July 2014

Screen Shot 2014-07-02 at 4.29.36 PM

3 questions about the future of cyber warfare

“We’re not creative enough when we imagine cyber warfare,” F-Secure…

8 days ago

The Phone Hunt is over, but hopefully you all have free Anti-Theft for Mobile on your phone to remind you of the good times.

We lost 15 phones all over the world (in 15 of the 16 countries where F-Secure has offices, as a few wise Phone Hunters figured out). The clues were viewed nearly 9,000 times, and our winners came from all over the globe: Finland, Indonesia, Romania, Germany, Philippines, Poland, the USA, the UK, Slovakia, the Netherlands, Sweden, and France.

As the FIFA World Cup hits the quarterfinals, we found this giveaway to be a small celebration of what people everywhere have in common: We all love competing (and we all hate losing our phones!).

We got some great recommendations from you Hunters. Some of you wanted harder locations. Some wanted it to be easier, of course. There was a suggestion that we take your video submissions for the next Phone Hunt, which would be a lot of fun. We’ll definitely keep your ideas in mind as we plan more fun activities.

If you want enhanced protection for your phone, you can always try out entire Mobile Security suite, free for 7 days. It includes Browsing Protection to protect you from scams and malware, while making your financial transactions safer than ever. And it includes Anti-Theft as well for total mobile protection.

Of course, we hope you’ll only enjoy the peace of mind that comes from having Anti-Theft on your phone without having to actually use the features. But if you do lose possession of your phone and use Anti-Theft to recover it or protect your data, we want to know.  Post a comment here, or contact us through Facebook or Twitter.

Thanks again for playing along,
Hetta

P.S. This will be my last post for a while as I am going on maternity leave. And don’t worry, the baby already has a mobile phone. F-Secure, I’m sure, will soon start developing Anti-Theft for the Brio platform as well. ;)

July 2014

Screen Shot 2014-07-02 at 4.29.36 PM

3 questions about the future of cyber warfare

“We’re not creative enough when we imagine cyber warfare,” F-Secure…

8 days ago

June 2014

ID-100209464

Right to be forgotten – good or bad?

Have you ever Binged or Googled for your own name,…

15 days ago
Screen Shot 2014-06-24 at 4.28.26 PM

5 things you need to know about malware that takes your files hostage

1. Online criminals are using our sense of shame to rob…

17 days ago
Screen Shot 2014-06-23 at 4.07.40 PM

11 ways to stay SAFE online when you’re traveling

If you bring your phone, tablet or laptop with you…

17 days ago
2710_fsecure-freedome_2297

How to teleport around the world using your mobile phone

While Finland is known for being the first country in the…

18 days ago
Digital Freedom

Our fundamental human rights are being violated

We are worried about our digital freedom and need your…

22 days ago
Screen Shot 2014-06-17 at 8.44.57 AM

3 free ways to stop Facebook from tracking you all over the web

“Privacy activists, you may start shouting… now,” Gizmodo‘s Jamie Condliffe wrote last week….

24 days ago
Screen Shot 2014-06-09 at 4.41.02 PM

Help shut down a massive crimeware botnet with one click — while you can

F-Secure is proud to be part of the global effort…

more than a month ago
Screen Shot 2014-06-03 at 8.10.58 PM

Are your terrible passwords guessable?

The #Heartbleed vulnerability got people thinking about passwords — a…

more than a month ago
mikko_republica_b

Why Edward Snowden Gives Me Hope

Exactly one year ago today, we saw the very first…

more than a month ago
Powered by WordPress.com VIP