Exploits are objects or methods that take advantage of a flaw in a program to make it behave unexpectedly. Doing so creates conditions that an attacker can use to perform other harmful actions. An exploit can be either an object or a method. For example, a specially crafted program, a piece of code or a […]
Category: F-Secure for Windows
Backdoors (F-Secure Windows)
Backdoors are features or programs that can be used to evade the security features of a program, device, portal, or service. A feature in a program, device, portal or service can be a backdoor if its design or implementation introduces a security risk. For example, hardcoded administrator access to an online portal can be used […]
Trojans (F-Secure Windows)
Trojans are programs that offer, or appears to offer, an attractive function or feature, but then quietly perform harmful actions in the background. Named after the Trojan Horse of Greek legend, trojans are designed to appear attractive to a user. They may look like games, screensavers, application updates or any other useful program or file. […]
Worms (F-Secure Windows)
Worms are programs that send copies of themselves from one device to another over a network. Some worms also perform harmful actions on an affected device. Many worms are designed to appear attractive to a user. They may look like images, videos, applications or any other kind of useful program or file. The aim of […]
Potentially unwanted applications (PUA) and unwanted applications (UA) (F-Secure Windows)
‘Potentially unwanted applications’ have behaviors or traits that you may consider undesirable or unwanted. ‘Unwanted applications’ can affect your device or data more severely. An application may be identified as ‘potentially unwanted’ (PUA) if it can: Affect your privacy or productivity – for example, exposes personal information or performs unauthorized actions Put undue stress on your […]
What harmful content does (F-Secure Windows)
Harmful applications and files can try to damage your data or gain unauthorized access to your computer system to steal your private information. Source : Official F-Secure Brand Editor by : BEST Antivirus KBS Team
Restore quarantined items (F-Secure Windows)
You can restore the quarantined items that you need. You can restore applications or files from quarantine if you need them. Do not restore any items from quarantine unless you are sure that items pose no threat. Restored items move back to the original location on your computer. To restore quarantined items: Open F-Secure SAFE […]
View quarantined items (F-Secure Windows)
You can view more information on items placed in quarantine. Quarantine is a safe repository for files that may be harmful. The product can place both harmful items and potentially unwanted applications in quarantine to make them harmless. You can restore applications or files from quarantine later if you need them. If you do not […]
Using AMSI integration to identify script-based attacks (F-Secure Windows)
Antimalware Scan Interface (AMSI) is a Microsoft Windows component that allows the deeper inspection of built-in scripting services. Advanced malware uses scripts that are disguised or encrypted to avoid traditional methods of scanning. Such malware is often loaded directly into memory, so it does not use any files on the device. AMSI is an interface […]
Prevent applications from downloading harmful files (F-Secure Windows)
You can prevent applications on your computer from downloading harmful files from the internet. Some websites contain exploits and other harmful files that may harm your computer. With advanced network protection, you can prevent any application from downloading harmful files before they reach your computer. To block any application from downloading harmful files: Open F-Secure […]