Resources

 

NewsOlder NewsInforgraphicsReportsVideos
News
Ghost in the locks
Hotel rooms offer us a feeling of relative security. Would you feel as safe if you knew someone could open your door completely unseen, without the original key?

F-Secure has found serious design flaws in a popular smart lock software system. If exploited, it could allow the opening of millions of hotel room doors across the world without the original key.

Click below to find out how our hackers were able to create a master key out of thin air!

Learn more >>

Who stole the bits?

What should companies be prepared for when it comes to modern cyber security? Why does accurately detecting targeted attacks require completely new technologies?

Check out the next episode of Adventures in Cyberland, and find out the answers!

Learn more >>

F-Secure’s Guide to
GDPR Compliance

Are you and your customers ready for the GDPR?
Read our eBook, and find out what you need to take into
consideration when working towards compliance. You’ll also
hear great GDPR tips from one of F-Secure’s top cyber security consultants!

Click below to find out more!

Learn more >>

Demystifying Hardware Security

Andrea Barisani steps into the #CyberSauna for a frank and fascinating discussion about securing embedded devices of all kinds. Have a listen, and get five quick takes on the challenges of protecting hardware devices!

Listen to the podcast >>

gartner_magic_quadrant_epp
F-SECURE A VISIONARY IN THE
GARTNER MAGIC QUADRANT FOR EPP

Gartner has positioned F-Secure as a Visionary in the 2018 Magic Quadrant for Endpoint Protection
Platforms (EPP)
. Download the report for essential industry insight and details about the vendor evaluations.
You can also share the report results with your customers!
Download the report >>
© F-Secure Corporation
Older News
adventures_in_cyberland_ep4
Artificial Intelligence in cyber security
Artificial intelligence and machine learning are some of the hottest buzzwords in cyber security. But what do they actually mean for your organisation?

Click below, and find out how AI can help you deal with cyber attacks – even those no one has ever seen before!

Learn more >>

gdpr_guideF-Secure’s Guide to
GDPR Compliance

Are you and your customers ready for the GDPR?
Read our eBook, and find out what you need to take into
consideration when working towards compliance. You’ll also
hear great GDPR tips from one of F-Secure’s top cyber security consultants!

Learn more >>

f_secure_radarF-Secure Radar is
now better than ever!

We have added several new improvements to F-Secure Radar!
You can now offer your customers faster scans, quicker update
provisioning and streamlined usability.

Click below to find out more!

Learn more >>
cyber_risk_managementCyber Risk Management 101

Cyber threats come in many forms – that’s why their proper
quantification is so difficult. Read our article on cyber risk management,
and find out how you can help your customers analyse their
specific security needs better.

No more guesstimates or ballpark figures!

Learn more >>

gartner_magic_quadrant_epp
F-SECURE A VISIONARY IN THE
GARTNER MAGIC QUADRANT FOR EPP

Gartner has positioned F-Secure as a Visionary in the 2018 Magic Quadrant for Endpoint Protection
Platforms (EPP)
. Download the report for essential industry insight and details about the vendor evaluations.
You can also share the report results with your customers!
Download the report >>
© F-Secure Corporation

 

Inforgraphics

How Does Your Online Security Measure Up?

Why Do Newspapers Spy on You?

How does Encryption Work? (and Why it’s So Important)

An Infographic Look at the Rising Tides of Malware

Computer Invaders: The 25 Most Infamous PC Viruses of All Time

Reports

The realist’s guide to practical endpoint protection

How to Avoid an ‘Evil Roommate’ Attack

2017. The Year Android and Mac Malware Broke Big?

2016 Was Bad — 2017 Looks Worse

Another Reason 99% of Mobile Malware Targets Androids

Why These Online Criminals Actually Care About Your Convenience

F-Secure report details Russian cyber attacks on the U.S., NATO and others

The Great Politician Hack

The Dangers of Public WiFi – And Crazy Things People Do To Use It

 

Videos
Live Security by F-Secure
Let us in. Keep them out.
The Cybercrime Megatrend of 2018 | What the Cyber?
Protect Your Online Privacy and Stay Anonymous with F-Secure FREEDOME VPN
Take Control - F-Secure FREEDOME VPN
Don’t Let Trojan Horses Inside Your Connected Home | F-Secure SENSE
F-Secure Safe Review