Browsing Protection blocks the access to harmful websites when it is turned on. To make sure that Browsing Protection is on: Open F-Secure SAFE from the Windows Start menu. On the main view, select Secure Browsing & Banking. On the Secure Browsing & Banking view, select Settings. Select Edit settings. Note: You need administrative rights to change the settings. Turn on Browsing Protection. If […]
Articles Tagged: F-Secure for windows
Protecting your web browsing (F-Secure Windows)
Browsing Protection helps you browse the internet safely by providing safety ratings for websites on your browser and blocking access to websites that have been rated harmful. Source : Official F-Secure Brand Editor by : BEST Antivirus KBS Team
Submitting a sample (F-Secure Windows)
You can help us to improve the protection by contributing suspicious applications and websites for analysis. When the product blocks an application, for example because it is a possible security risk for your computer or the application tried to do something possibly harmful, you can send us a sample of the application for security research […]
Exploit kits (F-Secure Windows)
Exploit kits are toolkits used by attackers to manage exploits and deliver harmful programs to a vulnerable computer or device. An exploit kit contains an inventory of exploits, each of which can take advantage of a flaw (vulnerability) in a program, computer or device. The kit itself is usually hosted on a harmful or a […]
Exploits (F-Secure Windows)
Exploits are objects or methods that take advantage of a flaw in a program to make it behave unexpectedly. Doing so creates conditions that an attacker can use to perform other harmful actions. An exploit can be either an object or a method. For example, a specially crafted program, a piece of code or a […]
Backdoors (F-Secure Windows)
Backdoors are features or programs that can be used to evade the security features of a program, device, portal, or service. A feature in a program, device, portal or service can be a backdoor if its design or implementation introduces a security risk. For example, hardcoded administrator access to an online portal can be used […]
Trojans (F-Secure Windows)
Trojans are programs that offer, or appears to offer, an attractive function or feature, but then quietly perform harmful actions in the background. Named after the Trojan Horse of Greek legend, trojans are designed to appear attractive to a user. They may look like games, screensavers, application updates or any other useful program or file. […]
Worms (F-Secure Windows)
Worms are programs that send copies of themselves from one device to another over a network. Some worms also perform harmful actions on an affected device. Many worms are designed to appear attractive to a user. They may look like images, videos, applications or any other kind of useful program or file. The aim of […]
Potentially unwanted applications (PUA) and unwanted applications (UA) (F-Secure Windows)
‘Potentially unwanted applications’ have behaviors or traits that you may consider undesirable or unwanted. ‘Unwanted applications’ can affect your device or data more severely. An application may be identified as ‘potentially unwanted’ (PUA) if it can: Affect your privacy or productivity – for example, exposes personal information or performs unauthorized actions Put undue stress on your […]
What harmful content does (F-Secure Windows)
Harmful applications and files can try to damage your data or gain unauthorized access to your computer system to steal your private information. Source : Official F-Secure Brand Editor by : BEST Antivirus KBS Team