Trojans (F-Secure) 0 (0)

Trojans are programs that offer, or appears to offer, an attractive function or feature, but then quietly perform harmful actions in the background. Named after the Trojan Horse of Greek legend, trojans are designed to appear attractive to a user. They may look like games, screensavers, application updates or any other useful program or file. […]

Read More

Worms (F-Secure) 0 (0)

Worms are programs that send copies of themselves from one device to another over a network. Some worms also perform harmful actions on an affected device. Many worms are designed to appear attractive to a user. They may look like images, videos, applications or any other kind of useful program or file. The aim of […]

Read More

Potentially unwanted applications (PUA) and unwanted applications (UA) (F-Secure) 0 (0)

‘Potentially unwanted applications’ have behaviors or traits that you may consider undesirable or unwanted. ‘Unwanted applications’ can affect your device or data more severely. An application may be identified as ‘potentially unwanted’ (PUA) if it can: Affect your privacy or productivity – for example, exposes personal information or performs unauthorized actions Put undue stress on your […]

Read More

Restore quarantined items (F-Secure) 0 (0)

You can restore the quarantined items that you need. You can restore applications or files from the quarantine if you need them. Do not restore any items from the quarantine unless you are sure that items pose no threat. Restored items move back to the original location on your computer. To restore quarantined items: Open […]

Read More

View quarantined items (F-Secure) 0 (0)

You can view more information on items in the quarantine. Quarantine is a safe repository for files that may be harmful. The product can place both harmful items and potentially unwanted applications in quarantine to make them harmless. You can restore applications or files from the quarantine later if you need them. If you do […]

Read More

Using AMSI integration to identify script-based attacks (F-Secure) 0 (0)

Antimalware Scan Interface (AMSI) is a Microsoft Windows component that allows the deeper inspection of built-in scripting services. Note: AMSI integration is only available on Windows 10. Advanced malware uses scripts that are disguised or encrypted to avoid traditional methods of scanning. Such malware is often loaded directly into memory, so it does not use […]

Read More

Prevent applications from downloading harmful files (F-Secure) 0 (0)

You can prevent applications on your computer from downloading harmful files from the internet. Some websites contain exploits and other harmful files that may harm your computer. With advanced network protection, you can prevent any application from downloading harmful files before they reach your computer. To block any application from downloading harmful files: Open the […]

Read More

Adding and removing protected folders (F-Secure) 0 (0)

You can choose which folders require an additional layer of protection against destructive software, such as ransomware. Ransomware protection blocks any unsafe access to your protected folders. Open the product from the Windows Start menu. On the main view of the product, select Tools. On the Tools page, click App and file control. Note: You need administrative rights to access these […]

Read More

Using Ransomware Protection (F-Secure) 0 (0)

Ransomware Protection monitors a set of folders for potentially harmful changes made by ransomware or other, similar harmful software. Ransomware is harmful software that encrypts important files on your computer, preventing you from accessing them. Criminals demand a ransom to restore your files, but there are no guarantees you would ever get your personal data […]

Read More