Save with Coupon Codes. With US Promo Portal.
United StatesUnited States (Eng. Esp.)
Homepage > F > F-Secure.com Coupon Code - August 2019
F-Secure.com

F-Secure.com Coupon Code

Filter by:

Current Promo Offers - August 2019

Unreliable Offers

50 % on F-Secure TOTAL Coupon (to 20th May)
40% Off F-Secure Booster (to 28th Jan)
Free F-Secure Adblocker (to 22nd Feb)
Free VPN For 90 Days at F-secure - New Accounts Only Coupon (to 31st Dec)
50% Off F-secure Safe And F-secure Freedome This Black Friday Coupon (to 28th Nov)
Free Trial Available (to 24th Nov)
Free License For 6 Months at F-secure Coupon (to 31st Dec)
Free Subscription For 4 Months at F-secure - New Accounts Only Coupon (to 31st Dec)
Free One Year F‑Secure Freedome at F-Secure - VIP Only Coupon (to 31st Dec)

Twitter

16th Aug: Before the world heads back to school, here are 5 things you can do to step up your #cybersecurity and #privacy 1… https://t.co/BExmIy5V1B
16th Aug: F-Secure’s Hardware Security team makes, breaks, and studies secure boot schemes. Recently, they disclosed two de… https://t.co/rum13X0tmZ
15th Aug: As @ekoivune told you in January: Never expect your Facebook Messenger conversations to remain private… https://t.co/DrmtAp5IK3
15th Aug: Hiding malicious code with “module stomping” – F-Secure’s Aliz Hammond @AlizTheHax0r explains how attackers use thi… https://t.co/OJm813Tkze
15th Aug: "Consumers don’t know how to patch #connectedhome devices. I mean, one of the fundamental problems we have is that… https://t.co/WnF4ZTuhmj
14th Aug: WARNING: Flawed secure boot schemes becoming too common "You don’t hear about secure boot processes too often. But… https://t.co/fJXSV8cgXQ
14th Aug: Are you our new Lead Backend Software Engineer for the Security Cloud? #InfoSec https://t.co/Kj39UGP7Kq https://t.co/Ci3bFlFlE7
14th Aug: So, because there’s nothing wrong with BIG-IP itself, it’s not an issue that F5 or anyone can fix with a simple sof… https://t.co/WAWGhnv2mt
13th Aug: How do you interpret the @MITREattack Evaluation? With our handy guide! #attackdetection https://t.co/wYhLF1YoUK
12th Aug: With great research comes great responsibility. Christoffer has also made tools available to detect and fix the iss… https://t.co/YMHmS5WJWw
12th Aug: Twitter has admitted to using customer data for ads without users’ consent. Check these settings to lock down you… https://t.co/Y7CLCCbZVp
12th Aug: Attackers could inject arbitrary Tcl commands. Hackers could then use a compromised BIG-IP device to intercept and… https://t.co/nXGcu90wCW
11th Aug: "So, our labs did a study, came out at the end of last year or so. A third of #connectedhome #vulnerabilities are o… https://t.co/emw7pkZeqa
10th Aug: We are proud to be listed as a Representative Vendor in the new @Gartner_inc #MDR Market Guide 2019 – a must-read f… https://t.co/040YiJEgtS
9th Aug: "The lines between real and virtual worlds are blurring fast," @mikko said at #BHUSA. "Several governments have p… https://t.co/q5zIDcVjeD
9th Aug: NEW RESEARCH: @Kuggofficial has discovered a security flaw that can turn F5’s BIG-IP load balancers into beachheads… https://t.co/SumtrNKVOS
9th Aug: This starts at 5 PM PDT in Islander EI #BHUSA. See you there. https://t.co/2ZRVl9qTAM
8th Aug: What cyber deterrence? “The power in the tens of thousands active nuclear war heads on this planet right now is no… https://t.co/d4XWzFw5WS
8th Aug: “There is no other government on this planet that would resort to stealing from other governments to fix their budg… https://t.co/H1bU69zoLm
8th Aug: MITRE helps you defend your organization against commonly used techniques. What is it and why it’s important in… https://t.co/vVa8r6ovoW
8th Aug: What the APT1 attacks have shown us is that the direct impact from a #cyberattack can now be felt quickly enough an… https://t.co/OiC9qxbY1Q
6th Aug: North Korea made $2bn from #Cybercrime and spent it on weapons, claims UN https://t.co/4j8GcwWqJ2 This report foll… https://t.co/NKun5BYGXZ
6th Aug: Want to know the one simple thing you can do to secure your #smarthome devices against 1/3 of all #IoT… https://t.co/0HSU8XOcgs
5th Aug: Senior Full Stack Developers wanted for one of our best agile teams, working with one of the fastest growing produc… https://t.co/c7TLyofWXa
4th Aug: Congratulations to @nxsolle and Pasi Saarinen for your Pwnie nomination for "An ice-cold Boot to break BitLocker”… https://t.co/cCH02eCnfh
4th Aug: How to prepare your device before you go on vacation: *Backup your devices. *Test that your backups work. *Make s… https://t.co/XamUE1Hxiq
3rd Aug: Do you use a separate browser for your social media activities? https://t.co/DXNzkt3U0I
3rd Aug: "I know how difficult cyber security can be for a CEO and for boards." - @rsiilasmaa Cyber security for CEOs and b… https://t.co/YGpzVYhTz9
2nd Aug: Hunting for KillSuit - #threathunter Connor Morley shows how to detect and respond to the final remnants of the… https://t.co/qCud5OXTrN
1st Aug: F5’S BIG-IP products are used by banks, corporations & governments around the world. On August 8 at #BHUSA F-Secur… https://t.co/NRlXbR8jcg
1st Aug: Cyber attacks pioneered by North Korea now spreading to other threat actors, F-Secure warns #Cybersecurity… https://t.co/c4nZ8KRney
31st Jul: NEW REPORT: F-Secure’s #cyberthreat landscape for the #FinanceIndustry sector Various tactics, techniques, and pro… https://t.co/hHMaCtqGB3
31st Jul: NICE: In the latest @avtestorg, both our business and consumer products got the highest score -- in all three categ… https://t.co/vM6QZXSN1e
31st Jul: Achieving 100% response readiness requires a high level of time and investment. This is how organizations should pr… https://t.co/BleItuHRu5
31st Jul: How do three firms, market leaders in their respective industries, owners of cutting-edge IP and global contracts,… https://t.co/TFrKK2JExF
30th Jul: "This is a good rule of thumb: if you can remember your passwords, they’re weak.” https://t.co/dBSI6OSabB https://t.co/n7QEJpzEWi
28th Jul: Have you found out what #Facebook, #Google, #Snapchat, #Apple, #Twitter and #Amazon know about you, yet? #privacy… https://t.co/I9sEt5XP8P
28th Jul: What the APT1 attacks have shown is that the direct impact from a #CyberAttack can now be felt quickly enough and s… https://t.co/AJBsuXmauw
27th Jul: How to secure your devices before, during and after your holidays. #privacy #traveltips https://t.co/u6GuK1Utox https://t.co/lFbrSqPpem
26th Jul: Ever wonder how many recordings of your voice Amazon keeps? Now you can hear yourself in each file, one by one.… https://t.co/sVaw6ueLLZ
26th Jul: As part of the CEO’s and/or the board’s journey to understand the company’s maturity #CyberSecurity level, you shou… https://t.co/Phl8LrzBUw
26th Jul: Read our best practice on how your defense teams can best utilize the MITRE ATT&CK framework #CyberSecurity https://t.co/pTdAE1kgCt
25th Jul: One thing that’s certain is plastic hotel keys with magnetic stripes are vulnerable. “It’s a known fact that you c… https://t.co/NC643gDZD8
24th Jul: Track your GDPR compliance status with F-Secure Radar, and identify the areas where you need to improve.… https://t.co/lM08OdEb7D
24th Jul: Wee-Jing Chung, a threat hunter in our Singapore office, has written a script for detecting when a cyber attacker i… https://t.co/mGvSSiVxDS
24th Jul: STILL RELEVANT: You Need to Patch the #BlueKeep RDP Vulnerability (CVE-2019-0708) https://t.co/1OKbA2NeTa https://t.co/aJNATk7ChE
23rd Jul: 1. Traditional security controls 2. Supply chain security 3. Phishing the C-Suite 4. MITRE ATT&CK framework 5. Cap… https://t.co/4QSx3Amiw8
23rd Jul: Attention Threat Hunters! Get our script for detecting when attackers have attempted to bypass AMSI: https://t.co/emSgdfpyxJ
22nd Jul: We imagine how machines could use adversarial attacks on #ArtificialIntelligence to attack, dominate, and possibly… https://t.co/crwNnbpSgF
22nd Jul: Battling the cyber skills shortage? Read our guide on recruiting the best technical talent in the industry.… https://t.co/XoT3T3ZCr5
21st Jul: Hunting for AMSI bypasses Like all great walls of defense, AMSI is not infallible. https://t.co/jCmYpAzbLV https://t.co/PWGye5uG2E
20th Jul: The ability to detect threats & respond to them before they can inflict serious damage is key to improving cyber de… https://t.co/wMVcfXZkDS
19th Jul: The latest @Gartner_inc #MDR Market Guide is out now! Download the complimentary guide to see how your organization… https://t.co/4sgIXmij08
19th Jul: You could use an adversarial #ArtificialIntelligence attack to down a drone, in much the same way you could attack… https://t.co/QvSJa2f7RY
19th Jul: F-Secure’s revenue growth continued in all businesses during Q2. The total revenue increased by 25% to EUR 54.1 mil… https://t.co/mpPxUwqpBD
18th Jul: What sort of #ArtificialIntelligence attacks might we see? * Fake content * Intelligent automation * Disinformatio… https://t.co/qZMm64mXUP
18th Jul: Introducing Data Discovery Portal! This tool reveals the true cost of ‘free’ online services — your data and ident… https://t.co/dj2KPtiO1W
18th Jul: It takes an average of 69 days to respond to an attack once it has been detected. How do you close this gap?… https://t.co/I4KRrFrQRq
17th Jul: Phishing and social engineering are still responsible for upwards of 90%+ of all #databreaches and other critical t… https://t.co/UI7TjUdHwF
16th Jul: "The ability to detect threats and respond to them before they can inflict serious damage is key to improving cyber… https://t.co/q0KGJ0qL9j
16th Jul: If you don’t know what’s happening in your network, you’re bound to be the underdog. Endpoint detection and respons… https://t.co/2te5r1U6RR
16th Jul: “Critical Infrastructure, due to its nature, is an interesting target for a foreign nation-state, even during peace… https://t.co/AbvIyZF0qi
15th Jul: What makes good #ArtificialIntelligence go bad? > Incorrect Design Decisions > Deficiencies in Training Data > Inc… https://t.co/60Rc6ogbIg
14th Jul: F-Secure Protection Service for Business sets new standards in securing your endpoints. Consistently winning tests,… https://t.co/q2x1PVznys
13th Jul: Fixing search results, using a hidden voice to get Alexa to buy something, taking down a drown. These are just some… https://t.co/pIOqDT5Am7
12th Jul: “Most current #AI really isn’t all that smart. It does exactly what it was trained to do – whether that’s good or b… https://t.co/QQgszhRe8r
12th Jul: It takes an average of 69 days to respond to an #CyberAttack once it has been detected -- and detection alone takes… https://t.co/e5tcazkH4t
11th Jul: If AI could feel, it’d fear cyber attacks from people NEWS: F-Secure and SHERPA highlight that attacks against AI… https://t.co/aNTsWbGKjX
10th Jul: F-Secure Protection Service for Business sets new standards in securing your endpoints. Consistently winning tests,… https://t.co/d1ItgNIxrg
10th Jul: “We also find things like anything with something for free, you find people will always click." Here are some ways… https://t.co/Sg6kfmE8kQ
9th Jul: Yeah, but basically, what we’re saying is that the little HTTPS certificate only tells you that you’re seeing the w… https://t.co/48zxpN3tCf
8th Jul: How much time should CEOs allocate to cyber security, and how often? What are the right questions to ask? How s… https://t.co/gWKa3nsjDx
7th Jul: Why #cybersecurity is a business enabler Investing in security will enable our organization to capture more value… https://t.co/Oq6x3dJMBl
6th Jul: Summer is good. Our Fellows in Poznan were able to catch some scenery in between the sessions of the Romanian… https://t.co/IVH7FRStLY
6th Jul: Most people, 51%, have experienced some sort of cyber crime in their family, with over a fourth, 26%, having experi… https://t.co/LSHUbSJvYS
5th Jul: "Our #detection and #response goal is to be effective at detecting sophisticated targeted attacks that have not nec… https://t.co/aL5Tg9TX5M
5th Jul: How can you know if a website is legitimate and trustworthy to use? And how can developers design a website to be s… https://t.co/wG5yIp8j7m
4th Jul: Spam never went away and continues to be one of the tools criminals rely on most for #phishing because it works. He… https://t.co/PUC2sWCuX5
3rd Jul: Detecting, responding to, and containing a live attack is down to preparation in three key areas: 1. Speed 2. Visi… https://t.co/tIvq0eE78S
2nd Jul: When running a virtual machine - can you launch something on the host machine? A #virtualbox trick from @Yogehi. https://t.co/uJeGOjPMqX
2nd Jul: 57% of security breaches are caused by #vulnerabilities that could have been patched. Similarly, 34% of those who… https://t.co/78GGKqUePp
2nd Jul: Sockpuppies! Our @r0zetta and @_kurimo_ take a look at strange Twitter phenomenon -- sockpuppet accounts building… https://t.co/PQkHCYgfWi
30th Jun: The word that hacks our brain -- FREE. High earners, law firms, really well-paid individuals. Offer them a free ca… https://t.co/20MzswxXfH
29th Jun: How to recruit for #incidentresponse >Consider how you pitch your company to graduates >Have the best onboarding… https://t.co/MMVstQk6cL
29th Jun: Most cyber attacks begin at the endpoint. Take the test to find out how well your endpoint devices are protected.… https://t.co/yan2YAr6Lv
28th Jun: 2018 F-Secure Vulnerability Reward Program update from @i_kira18: ≈42 unique submissions ≈€37,000 for 39 total r… https://t.co/CVkt5yVolK
27th Jun: Want to get paid to hack cars? Do you eat, breath and sleep 0day? Want to compete at Pwn2Own and other bounty chall… https://t.co/SIXELkntIY
26th Jun: About 4 out of 5 people who’ve take our basic #cybersecurity test have gotten more than 50% right. But that means a… https://t.co/LEGypPyscv
26th Jun: NEWS: F-Secure is creating a new team dedicated to building on the company’s tradition of staying ahead of attacker… https://t.co/X1hngf9UOz
25th Jun: "We phish ourselves internally, & I’ve been caught before in one of our simulated attacks. And I think that I’m qui… https://t.co/cOM4gwB7IQ
23rd Jun: It takes an average of 69 days to respond to an attack once it has been detected -- detection alone takes on averag… https://t.co/eXZ3aOHBep
22nd Jun: "As machine learning development tools get easier and easier to use, criminals will no longer have to find someone… https://t.co/UJmYlMKPfx
22nd Jun: #EPP and #EDR – What is Their Role in Your #Cybersecurity? Endpoint protection solutions (#EPP) are essential, but… https://t.co/nN7GtnuwFn
21st Jun: Test yourself: Are you in the top 4% when it comes to basic #cybersecurity? https://t.co/hzmfyVaizC https://t.co/eSpvawqHik
21st Jun: A turn-key #VulnerabilityManagement platform like F-Secure Radar provides prioritized reports on the most dangerous… https://t.co/ZZq1PKO7xJ
21st Jun: "A manufacturer asking its end-users to take care of security for them is problematic." @0xtosh on what you need… https://t.co/9NaX6whPl8
20th Jun: Considering how dangerous BlueKeep could be, you might think everyone has already installed the patch – but you’d b… https://t.co/3iFMSqhFXz
19th Jun: #EPP solutions are important, but not designed for post-compromise security. #EDR solutions help you catch advanced… https://t.co/NIyht6pMZa
19th Jun: "Sign In with Apple" could mean less profiling of your online activity—if #Google and #Facebook weren’t already so… https://t.co/h73lWrPYJR
18th Jun: "We’ve done some research around people who click #phishing emails around lunchtime. And we found when people are h… https://t.co/pIMbYXqzkY
17th Jun: F-Secure Radar helps you comply with #GDPR requirements. Read the whitepaper to learn how.… https://t.co/t68OdLce0U
14th Jun: “The green lock is just not enough." https://t.co/hwQtCGxQjN https://t.co/uVnsMYPCgH
13th Jun: Do you think you know more about online security and privacy than your friends? Take our new test to find out if… https://t.co/vfdc3H6JpI
13th Jun: Q: How successful is simulated phishing? Do companies notice a decrease in infections after they use phishing servi… https://t.co/a5qM9mmcoA
12th Jun: And, yes, we are hiring Security Consultants in the US, the UK, Denmark and South Africa. https://t.co/WrhDmQDaSl https://t.co/SsVwM7Vl84
11th Jun: Thinking about a career in Incident Response? Your go-bag will become one of the most important things you own.… https://t.co/pHXRewDAo4
11th Jun: How well are you doing at protecting your mobile devices, laptops, and desktops? Take the test and receive your f… https://t.co/wOQZpFnTLP
11th Jun: “Espionage and sabotage attacks against Critical National Infrastructure (CNI) organizations have increased over th… https://t.co/KwU1oMrVNL
10th Jun: Why Is America So Far Behind Europe on Digital Privacy? https://t.co/nSROxHpnZA
10th Jun: Our colleagues at @mwrinfosecurity have 3 great talks at Infosec in the City, Singapore: You are Not Hiding from M… https://t.co/FWZsFtapwY
10th Jun: Why is there’s so much spam coming from .xyz and other new top-level domains? https://t.co/HhgSKyunkx https://t.co/jiyThXZiHb
8th Jun: Thanks to @mighty_gadget for naming @FSecure_SENSE one of the "The Best Home Automation Systems & Devices for 2019"… https://t.co/2fvoNFrG4r
8th Jun: How do criminals trick you into installing #ransomware? It could be this simple. #cybersecurity… https://t.co/Nx9wbCzIh9
7th Jun: Almost 3 out of 4 fear becoming a victim of cyber crime or identity theft -- and 51% of them are right… https://t.co/PPOVbjHaZk
6th Jun: “This is not about keeping the bad guys out – because they will get in – but about being able to detect them quickl… https://t.co/Ghx8TejrQg
6th Jun: Want to protect kids online without risky age verification schemes? Here are three steps you can take.… https://t.co/PME6nGB4xe
4th Jun: "We are only scratching the surface with the current applications of machine learning. The revolution is underway,… https://t.co/Gza7CTYdj3
4th Jun: Now on stage at #InfoSec19 our very own @0xtosh https://t.co/kwGfQkOZHe
4th Jun: Chances are someone in your family has been affected by cybercrime. https://t.co/z0CcMRCXZw https://t.co/cmO5u9WROM
4th Jun: F-Secure’s Protection Service for Business delivers the best #endpointprotection day after day - proven by consiste… https://t.co/HtFwn5sY5K
3rd Jun: What should you do about the #BlueKeep RDP Vulnerability CVE-2019-0708? https://t.co/1OKbA2NeTa https://t.co/GsywOx0KNy
1st Jun: Nice. @avtestorg has awarded both our Consumer and Business products a "Top Product" rating for March/April -- 2nd… https://t.co/PAV8mghWJw
31st May: WEEKEND PRIVACY GOAL: 🔒Lock down your LinkedIn account for better privacy and OPSEC🔒 For many professionals, Link… https://t.co/Zz0I8Zdqxz
31st May: Cyber crime is more common than theft, according to the the Office of National Statistics. No wonder consumers ha… https://t.co/7EZZA1kYxg
30th May: How does #BlueKeep RDP Vulnerability CVE-2019-0708 differ from other vulnerabilities? https://t.co/1OKbA34QhK https://t.co/vz2AbzNaKa
29th May: A year after the #GDPR, are we better off? https://t.co/r1rdCqL5bC
29th May: News: 71% of internet users say they feel that they will become a victim of cybercrime or identity theft. 73% exp… https://t.co/FDGfXRK3U2
28th May: Phishing scams feed on our desire for great news and our fear of bad bnews. https://t.co/wzI2rEdxNC https://t.co/vEdEtX1Yvz
27th May: The best protection in the world comes from Finland. In hockey, it’s Lankinen. In cyber security, it’s F-Secure.… https://t.co/1DgF4PX9mb
26th May: "This approach is creating a significant threat to users’ privacy, security, physical safety, and even basic human… https://t.co/I7lYFPXgu5
25th May: While analyzing the collected data, we stumbled upon some highly political tweets that received a great deal of sus… https://t.co/kPJKPsVrsI
24th May: NEWS: You Need to Patch the #BlueKeep RDP Vulnerability (CVE-2019-0708) https://t.co/1OKbA34QhK https://t.co/YZF1wvd5u5
23rd May: Would you click on this? https://t.co/wzI2rEv9cc https://t.co/laGqBwBfh0
23rd May: Get the eye of the TIBER. F-Secure’s @0xtosh and other security pros are talking TIBER this morning in Copenhagen… https://t.co/5CD9QgSPi7
22nd May: Organized Crime Behind Virus Affecting Ohio Schools, FBI Says https://t.co/v6g6AvrLsC https://t.co/y97yag69l8
22nd May: "And I really hope that we will see that in the future, people will become more safe, that the data processing, the… https://t.co/a65hk1othy
21st May: How to Lock Down Your LinkedIn for Better Privacy and OPSEC https://t.co/Ba2nH61dlP https://t.co/sqFb2J3qkM
21st May: Thank you all for attending and singing along! Safe travels home and see you next year #FSECURESPECIES19 https://t.co/rv4mw86SFh
21st May: “The biggest risk to your business might be someone else’s business.” @lehtior2 about supply chain attacks… https://t.co/YxLRjP8ijD
21st May: “There’s a shift in ransomware delivery” says @SamiRuohonen from @FSLabs #FSECURESPECIES19 https://t.co/Gtt6dkvqe8
21st May: “Quantum computing is here” says Laurens van Dijk from KPN #FSECURESPECIES19 https://t.co/3H0mNeGKnZ
21st May: “I don‘t like if users are blamed for cyber problems. It’s the systems which are stupid” says @mikko… https://t.co/mUwefuBiSL
21st May: Good morning and welcome back. Next on our cyber security rock star @mikko #FSECURESPECIES19 https://t.co/pgdcbH8hws
21st May: Day 1 is a wrap. Congrats to the winners of the 2019 B2C awards: M-Net and SFR! See you tomorrow #FSECURESPECIES19 https://t.co/nJd2WfelsA
20th May: The proud winners of our 2019 B2B awards: percomp, Takarajoho and Viria Security. Congrats! #fsecurespecies19 https://t.co/LxGhxne16i
20th May: We are soon announcing the winners of our partners awards. Exciting! #fsecurespecies19 https://t.co/zubThY1BCH
20th May: “The question is: is Huawei big enough to bring developers to support their platform?” says @mikko Hypponen.… https://t.co/yaBQVfhFkR
20th May: A very traditional evening. Enjoy the Bavarian specialities! #FSECURESPECIES19 https://t.co/jXWhQeglbT
20th May: How to climb the data summit - final keynote of today by Dr. Susan Wegner #FSECURESPECIES19 https://t.co/TWMwLWNZDy
20th May: Only 8 hours left to get this deal! 50% discount on both F-Secure TOTAL and FREEDOME VPN! Use code ONLINE50 or vis… https://t.co/yTPZn9uuvE
20th May: Elena elaborating on our broad range of partner trainings #FSECURESPECIES19 https://t.co/AURilbMdsY
20th May: “Disruption boosts customer-centricity” @PerttuPolonen #fsecurespecies19 https://t.co/lGGRurtHKy
20th May: The amazing @PerttuPolonen now on stage #FSECURESPECIES19 https://t.co/ndDomLmCDB
20th May: “The next battlefield in cyber security: mastering response” @KonttinenSamu #FSECURESPECIES19 https://t.co/oCRilUwlva
20th May: “We are trusted by companies for which cyber security is absolutely critical” says @KonttinenSamu #FSECURESPECIES19 https://t.co/g6tmXxjHmN
20th May: Our CEO @KonttinenSamu opening with talking about what matters most to our brand: trust #fsecurespecies19 https://t.co/LICFCN1IJN
20th May: We are on #FSECURESPECIES19 with @peprosenfeld and @MarcusJHBrown https://t.co/bzIofyaQhg
20th May: Welcome to #FSECURESPECIES19 https://t.co/HgT3BY9JT2
19th May: “The average family has six-to-seven connected devices. That can be as high as 20-to-30 devices in some homes, and… https://t.co/ly33jwRgRL
18th May: "This is likely the result of a strong pro-Brexit amplification campaign we’ve been observing...,” @r0zetta said. “… https://t.co/lvzQeeUgyz
18th May: Regulation for #IoT devices is finally arriving, but millions of vulnerable devices have already filled up homes.… https://t.co/R1XDcbSXpS
17th May: Why is there’s so much spam coming from .xyz and other new top-level domains? Online criminals are experts in usin… https://t.co/fTPBT3AdZy
16th May: We are honored to be ranked 4th among Finland’s #MostAttractiveEmployers by IT students in Universum’s annual surve… https://t.co/PvgR0Q6Qv5
16th May: “Espionage and sabotage attacks against Critical National Infrastructure (CNI) organizations have increased over th… https://t.co/gIVaqgdO4h
15th May: F-Secure consultant discovers serious software flaws in IBM API Connect Attackers are able to exploit the two vuln… https://t.co/mKF7VdSIsD
15th May: Get F-Secure TOTAL or FREEDOME VPN now and save 50%! Buy from this link at a discounted price or use the code ONLI… https://t.co/81IoDKclfN
14th May: Join us and our partners at Carahsoft at #SalesforceTour DC for a complimentary public sector networking reception… https://t.co/EKCf5ZETvv
14th May: Have you updated WhatsApp yet? https://t.co/dYtSHU63NQ
14th May: “The green lock is just not enough." 5 ways to make sure a website is secure and private https://t.co/hwQtCGPrbl https://t.co/fo0vIbT3oN
13th May: If you run a small business and want to give your employees a quick lesson in recent #phishing emails to look out f… https://t.co/t2ce90hNMK
11th May: Spectre and Meltdown were wake-up calls to the world of data security. But did you know that under the #GDPR you… https://t.co/nyKiCi8RT7
10th May: In the last three months, @FSLabs observed some interesting patterns about the attachment types that are being used… https://t.co/rdgJGlvNbN
10th May: “The average family has six-to-seven connected devices. That can be as high as 20-to-30 devices in some homes, and… https://t.co/yw9x19jYyF
9th May: NEWS: F-Secure earns IEC certifications that validate our unique security engineering expertise in developing ICS c… https://t.co/QmY5v6TvZg
9th May: Hackers can purchase these some of these new top-level domain names for less than $1 each. For that low-low price… https://t.co/ncYyCvclk9
8th May: We enjoyed welcoming students from Jenkins Ry, Haaga Helia and Laurea University Science IT. We hope cyber security… https://t.co/Hq5i4HK56E
8th May: F-Secure is looking for a Domain Director for Desktops Is it you? https://t.co/K5vj9tz2dS #FSecureLife https://t.co/xkuFUI989Q
8th May: Threat actors breach even the most secure Critical National Infrastructure (CNI) organizations. The energy indust… https://t.co/qVWh0lvA6V
8th May: Great start into 2019: F-Secure’s revenue growth improved in both of our businesses during the first quarter to EUR… https://t.co/5NU1X0zFoJ
8th May: The biggest mistake people make when it comes to passwords is remembering them. https://t.co/WhHtjvpD3m https://t.co/g8M2nkP0ly
7th May: Why is there’s so much spam coming from .xyz and other new top-level domains? “So, for example, if… https://t.co/p4og1AfCx7
7th May: The Best Protection in the World Comes from Finland https://t.co/RufIYAcBIT
7th May: "Hackers had just been bombed, apparently for their hacking efforts. Mikko Hypponen, a well-known security research… https://t.co/SVokXvmvQz
7th May: "...the stories in the cyber security space are just as exciting as any good crime novels or TV shows.”… https://t.co/cNJZA1lcMV
6th May: Currently, 25% of U.S. broadband households that do not own a smart home device and do not plan to purchase one wil… https://t.co/PBeW66qWcT
6th May: "An attacker could also possibly cause service disruptions and establish an initial foothold on client’s internal n… https://t.co/Bm2MzULCmi
6th May: 3 reasons Google and Facebook may listen to you 1. You may have given Google and Facebook access to your microphon… https://t.co/QBduDHE5ez
3rd May: NEWS: F-Secure consultant discovers serious software flaws in IBM API Connect https://t.co/JJFdM1tojR https://t.co/3yAPJ6KxGy
3rd May: On #WorldPressFreedomDay, here are some basic OPSEC tips we offered to journalists covering the Putin/Trump summit… https://t.co/os11CVLA81
3rd May: "Another thing that became crystal clear during the pilot, if you don’t have full control over the endpoints, you h… https://t.co/Ljp7KUFdSF
2nd May: “There are indeed people offering malware posing as popular content, whatever the popular media of the day is. In t… https://t.co/LBnjIKrr3E
2nd May: Cyber criminals stole $81 million from the Central Bank of Bangladesh in 2016. The financial sector experienced 1… https://t.co/e7CseJXoVa
1st May: “As many as one third of IoT attacks abuse weak passwords and legislating to fix this basic issue can only be a goo… https://t.co/BFSwMmIaZO
1st May: Financial gain (53 %) and industrial espionage (47 %) are the main motives behind cyber attacks on the manufacturin… https://t.co/jevndYqjH7
30th Apr: You are Google and Facebook’s "product" https://t.co/aL28jUAqeC For example, Facebook users can check out their "i… https://t.co/Amp2P6UAjt
29th Apr: The financial sector experienced 146 breaches and 598 incidents last year. Attacks on web application authenticat… https://t.co/UaIXTsQ3ky
29th Apr: “So here’s a smart phone—vulnerable phone. Here’s a smart watch—vulnerable watch. Smart car, smart city, smart grid… https://t.co/0QhNSu4beo
28th Apr: Electronic voting creates more problems than it solves, but there are cases when it may be worth trying. Find out w… https://t.co/7XXGxCVptP
27th Apr: 3 reasons Google and Facebook may be listening to you -- and what you can do about it https://t.co/aL28jUAqeC https://t.co/WkV32EB2aA
27th Apr: No matter how much you know about Tinder, you may be shocked by what Tinder knows about you. https://t.co/a1OultQ4wB https://t.co/vhsL14LYA0
25th Apr: EPP v. EDR By the numbers: https://t.co/3Z4I9X1N52 https://t.co/8xEzpzNfpL
24th Apr: “I try and break stuff designed to be unbreakable. Then I try and help clients fix problems before bad guys find ou… https://t.co/1vOUMPhf39
24th Apr: “Is e-voting good or bad?” If only it were that simple. #CyberSauna https://t.co/ccqFqR0lIG https://t.co/3CIGJwFWHl
23rd Apr: 🔥🔥🔥🔥🔥 https://t.co/lLM0oQAwsG
23rd Apr: 3 things Tinder knows about you https://t.co/a1OultQ4wB https://t.co/vhsL14LYA0
23rd Apr: ICYMI: Some notes from @Mikko on the first F-Secure website launched 25 years ago and how we almost lost it. https://t.co/avLh8HgdBd
23rd Apr: In incognito mode, your browser itself won’t keep your browsing history, but your ISP still will. Hiding your IP… https://t.co/7pIQYZ7clI
22nd Apr: “Critical Infrastructure, due to its nature, is an interesting target for a foreign nation-state, even during peace… https://t.co/LviDsCASzC
21st Apr: Spam was the most common method cybercriminals used to spread malware in 2018, according to @FSLabs, accounting for… https://t.co/cyXWWHHAOs
20th Apr: >100 million new malware samples added every year >63% of IT security professionals say the frequency of endpoint… https://t.co/lJMYIEULR2
19th Apr: So what’s the first thing Jesse learned in F-Secure’s Cyber Security Academy? “Linux. I knew the basics of Linux.… https://t.co/txxfIcBCSN
18th Apr: Hiding your IP address keeps your ISP and search engines from being able to correlate your searches back to you.… https://t.co/xdI89whgIN
17th Apr: “No one likes spam email, but malware spam is even worse.” https://t.co/OrEJyuUJ8f https://t.co/F0fCN3Hjam
16th Apr: NEWS: Energy industry vulnerable to increased cyber espionage and sabotage attacks https://t.co/lOXJ01qfzQ https://t.co/MfjDPmjk6e
16th Apr: Hiding your IP address is a smart security and privacy move. https://t.co/v4qr0baURw https://t.co/7F4YSKpEho
15th Apr: What can you learn from investigating 24 million Brexit-related tweets? Find out in the latest episode of our… https://t.co/TIt38nNuSy
14th Apr: How do you protect your identity online? 1: Sort out your passwords 2: Switch on two-factor authentication 3: Crea… https://t.co/4V1PpESCdO
13th Apr: 5 reasons you should be using a VPN 1. Hiding your IP address 2. Changing your location 3. Encrypting your traffic… https://t.co/zp1D6qoSXd
12th Apr: The number of #IoT threats observed by F-Secure Labs doubled in 2018, growing from 19 to 38 in the space of a year.… https://t.co/PBc0xeKaap
11th Apr: F-Secure’s Cyber Security Academy has the distinction of being one of the few initiatives that give people a hands-… https://t.co/NYHSYsoezr
10th Apr: Be sure to catch our @ekoivune at 8.30 PM Helsinki time on @ylenews talking about the DDoS attack that was successf… https://t.co/YSG1GKpUM3
10th Apr: When it comes to breaches, "Firms should understand which scenarios pose a genuine risk to their business and then… https://t.co/gb9GdhTP0N
10th Apr: You can hide your IP when you want to make your browsing sessions private. https://t.co/v4qr0aTjZY https://t.co/cV8VgWCuQI
9th Apr: "I try and break stuff designed to be unbreakable. Then I try and help clients fix problems before bad guys find ou… https://t.co/nIivw7CNgP
9th Apr: If you use @FreedomeVPN on an Android, you can now use it on ChromeOS. https://t.co/ufYFhpCZ2U https://t.co/8noVVBmagI
8th Apr: Internet-connected “things” are lacking in basic security protections, putting consumers at risk. Home broadband… https://t.co/hKv8WWjuwP
8th Apr: What can you learn about the spread of misinformation on Twitter by following the #Brexit debate. #CyberSauna… https://t.co/hl8sQkMdF2
7th Apr: The strides made in detection have pulled #IncidentResponse further up the killchain, but how organizations approac… https://t.co/9MwDgvMKPV
7th Apr: 4 times you might want to hide your IP address 1. When you want to make your browsing private. 2. When you want t… https://t.co/lJZsytNwFt
6th Apr: NEW RESEARCH: Hundreds of Twitter users are collaborating to promote and amplify a handful of newly created US-poli… https://t.co/sY6puvCdb9
6th Apr: Known #vulnerabilities are easy targets for attackers, as most businesses fail to implement software updates quickl… https://t.co/g5azVnRcrR
5th Apr: 5 reasons you should be using a VPN now: 1. Hiding your IP address 2. Changing your location 3. Encrypting your tr… https://t.co/BgOa3oNdGi
4th Apr: The number of IoT threats observed by @FSLabs doubled in 2018, growing from 19 to 38 in the space of a year. Thre… https://t.co/aZ0nxF2pvJ
3rd Apr: Is a well-organized and potentially large network of individuals creating and operating multiple Twitter accounts i… https://t.co/VonbJA3OEY
3rd Apr: NEWS: F-Secure delivers a safe and secure network environment with customized F-Secure SAFE to So-net subscribers… https://t.co/vNBrUkem8v
3rd Apr: NEWS: You can now use @FreedomeVPN on ChromeOS devices that support Android apps. https://t.co/ufYFhpCZ2U https://t.co/fe5htLxIs1
3rd Apr: We’re at @IATA ’s Safety and Flight Ops Conference answering questions and offering advice about aviation cyber sec… https://t.co/rNLziDIRIh
2nd Apr: "If more companies would assume that their security will fail, if they will assume there will be a breach, if they… https://t.co/XwIyIzM27U
1st Apr: NEWS: F-Secure IoT Threat Landscape Report finds #IoT threats and attacks are increasing, but rely on well-known se… https://t.co/Dw0jcJsOG4
1st Apr: With nation-state capabilities and tools finding their way into the hands of cyber criminals, too many attackers no… https://t.co/vybPulp1d1
31st Mar: 3 surprising things about VPN, ping and gaming 1. A good VPN can actually IMPROVE your ping. 2. VPN lets you unlo… https://t.co/J1j0oAW6m8
30th Mar: “If you can remember your passwords, they’re weak." https://t.co/avux61qaNK https://t.co/zRgxwpejT1
29th Mar: It takes an average of 103 days for vulnerabilities to be remediated. 57% of data breach victims were compromised… https://t.co/e5mPKcNYnH
28th Mar: #ShadowHammer is a great example of a supply chain attack where a threat actor abused a trusted update utility to d… https://t.co/COfxzMoFhq
27th Mar: "In a connected home, your smart TV may connect to your wireless printer. Your game console may start communicating… https://t.co/tDy9x1TSar
27th Mar: For Lent: Stop reusing passwords! https://t.co/grL9xdseew https://t.co/unjdWMNwdO
27th Mar: Another day another hack. But 44% of businesses said they spend less on incident response than on their prediction… https://t.co/i88n4CsAvd
27th Mar: “Ransomware usually indicates fast gratification and payout for a criminal and as such this attack could be dismiss… https://t.co/VUvrNelf4B
26th Mar: Have you changed your Facebook password since the site revealed it stored up to 600 million credentials plain text? https://t.co/avux61HMck
26th Mar: "The WiFi router is the foundation of the home network. If that foundation cannot pass the test, everything connect… https://t.co/rhSY2S41EQ
26th Mar: "Consumers security and privacy have never been more at risk than today." @pgpalmer67 https://t.co/tQLCX1wH8z https://t.co/gd5tolnXPl
25th Mar: Pew found that 90% of teens, ages 13 to 17, said that spending too much time online is a problem for their age grou… https://t.co/G84ucswqy8
24th Mar: How to Hide My IP Address - Our Experts Answer https://t.co/qQdrmuxNXc
24th Mar: 86% of cyber attacks in manufacturing are targeted. 66% feature hacking, only 34% malware. 47% breaches involve… https://t.co/PdDRWzcgdp
23rd Mar: Predictions are hard, especially about the future. But here are a few things you can probably expect. 1. More data… https://t.co/iaZvLUaQFn
23rd Mar: Have you changed your Facebook password yet? Do it. And then forget it. https://t.co/avux61qaNK https://t.co/zaIf2A228O
21st Mar: “It might end up being the most expensive cyber insurance payment to date,” @mikko says. The Norsk Hydro cyber att… https://t.co/Wjxuy9lzsU
20th Mar: "The types of new devices that Mirai attacks have no business of being visible to the Internet." - @jarnomn New Mi… https://t.co/PTVnJskjDH
20th Mar: Norsk Hydro: LockerGoga encrypts everything, F-Secure researchers say https://t.co/ULxHSAJzZL https://t.co/qpy75RPsuK
20th Mar: When it comes to making sure kids stay safe online, parents already have a good model. 75% of parents had spoken t… https://t.co/FhfXPq10hg
20th Mar: Wondering how one of the biggest aluminum manufacturers in the world could be shut down by a cyber attack? It cou… https://t.co/xeoXhm6ijC
19th Mar: NEWS: F-Secure wins again with Techconsult’s 2019 Professional User Security Solutions Rating award for Radar… https://t.co/qfCpP7lBx5
19th Mar: What does suspicious or astroturf activity look like on Twitter? https://t.co/dmegCJghbI https://t.co/mJMRszPKFt
18th Mar: PHISHING ALERT -- #NewZealandTerroristAttack https://t.co/LypW1Wm4Jg
18th Mar: “One does not have the resources or the budget, nor the people, to be able to protect everything." #infosec… https://t.co/rJAyumon7P
17th Mar: What are the security benefits of moving to the cloud, and what are the special concerns? What should companies d… https://t.co/ACWrHMu5dX
16th Mar: If the UK holds a second #Brexit referendum, can it protect it from trolls and astroturfers? https://t.co/fC1ncMzOAq https://t.co/pqOEURxCo8
16th Mar: Ever wondered how criminals crack your password? Here are 3 ways your business is making it easy. #infosec… https://t.co/4RxcRl4pX8
15th Mar: 1. Identify your so-called “crown jewels.” 2. Identify other sensitive data. 3. Figure out your threat model. “… https://t.co/eAKfZxULVZ
14th Mar: "Enterprises need to be effective at detecting malicious activity in the earlier phases of the cyber kill chain and… https://t.co/KVidG2TkoJ
14th Mar: Twitter and other social media platforms have a direct line to 10 Downing Street. A “rapid response unit” of May’s… https://t.co/jsZhi02OwY
13th Mar: Reminder: WhatsApp creates a "shadow profile" of its users, too https://t.co/an7lKI8rYJ https://t.co/P8FSJ9usVc
12th Mar: "By now, we’ve woken up. In many ways, the dream has turned into a nightmare." Our @mikko on #Web30:… https://t.co/4EmbMKFAOA
12th Mar: NEWS: #Brexit-related Twitter mischief supported by global far right #socialmedia #misinformation… https://t.co/GPsnte2KoU
11th Mar: In the last year and 22% said their companies did not detect a single attack. 20% detected a single attack during… https://t.co/WkTNWGyHBc
9th Mar: While safety has been a concern in aviation for generations, security, especially cyber security, is a far newer co… https://t.co/gduJJCRJDI
9th Mar: "Many organizations don’t really value security until an incident threatens to cost them a lot of money, so I’m not… https://t.co/AQzMWVoqYF
9th Mar: “Most companies don’t really know what they should be protecting, and what it is that is worth protecting."… https://t.co/MwYaIhpNi9
8th Mar: Yes, you can listen to Mikko and #CyberSauna on Spotify. https://t.co/w4qIlIVejM https://t.co/A3s4TOfATQ
7th Mar: Reminder: F-Secure TOTAL now includes the premium version of our password manager KEY: https://t.co/ZuXWQDJunb https://t.co/evBDohco0q
7th Mar: Could you quit Apple, Microsoft, Google, Facebook and Amazon? https://t.co/Kz8zumGbEi https://t.co/c53So1lSTK
7th Mar: At #RSAC? Check out: Future Forests: Realistic Strategies for AD Security & “Red Forest” Architecture Featurin… https://t.co/HoefYMAklz
5th Mar: “Cyber actors actively search for and compromise vulnerable Internet of Things devices for use as proxies or interm… https://t.co/qHdZ2NpjeQ
5th Mar: NEWS: Attackers have been busy. Our honeypot servers registered a fourfold jump in attack and reconnaissance traffi… https://t.co/MjQ8XmiVsd
5th Mar: Traditional #CyberSecurity expertise alone is not enough to secure the systems on today’s e-Enabled aircraft.… https://t.co/ZzyaPVr8kA
4th Mar: Are you at #BSidesSF? Come check out this special Yackety Hack SF Happy Hour featuring our own @Mikko.… https://t.co/30Xmh2Bzuq
4th Mar: Are you using a password manager yet? https://t.co/c5dxzPe7JA https://t.co/kBp7UtsVlE
4th Mar: A day at @FSLabs looks something like this: 7 billion events, 6 billion online reputation queries, 1 million suspic… https://t.co/OXfgaEJ5at
3rd Mar: Lateral movement is the longest phase of an attack -- accounting for about 80% of an attack’s time frame.… https://t.co/BtlISoh7Gv
2nd Mar: You still have 1 more day to protect your devices and SAVE 50% off F-Secure @FreedomeVPN and TOTAL. ➡️ ➡️ ➡️… https://t.co/W0bG0khDVM
2nd Mar: "If you send a B-52 bomber to drop bombs somewhere, it’s kind of hard to deny that it’s not your B-52. When you do… https://t.co/LH2LM7ifo0
1st Mar: Reconnaissance is when attackers look into the target network. They probe the network to find out which ports are… https://t.co/SVRLBLNpTB
1st Mar: An attacker has breached your perimeter undetected. The intruder now roams the terrain of the network, hiding beh… https://t.co/8duuLul91i
28th Feb: Looking for key personnel is an important part of recon – as the saying goes, humans are the weakest link in securi… https://t.co/HDuZ62omNp
27th Feb: What is EDR and MDR? #ThreatHunting https://t.co/c8clkUXLTq https://t.co/Ow37DW07Rx
27th Feb: Financial gain (53 %) and industrial espionage (47 %) are the main motives behind cyber attacks on the manufacturin… https://t.co/pQFwdLey0D
26th Feb: “A targeted attack is a probability. But someone leaving their phone or their laptop in a taxi or on the train, tha… https://t.co/puiZUEegw9
25th Feb: "Yeah, I think cyber weapons are much more common than cyber war. And like we discussed, Stuxnet was a cyber weapon… https://t.co/CLrnX5wDka
24th Feb: “The pressure is always on when a company has consistently won an award. But even amidst the pressure, engineers an… https://t.co/aSEAJDUzNk
23rd Feb: Dating scams were one of the most common sorts of spam F-Secure found in 2018, a trend that seems to be continuing… https://t.co/iK4tbCPVyQ
22nd Feb: "Social network data is like a living organism that changes from moment to moment." - @r0zetta… https://t.co/JOrcCykJnc
22nd Feb: Why is unplugging all Ethernet, Wi-Fi, Bluetooth, NFC, and Mobile Data Network connections, including SIM cards, be… https://t.co/U7MJSZ7n6K
21st Feb: NEWS: F-Secure has won our 6th and 7th Best Protection Awards from @avtestorg #Infosec https://t.co/UPEDYJaWkl https://t.co/eP3avS5Ztt
20th Feb: With a lack of clear frameworks for evaluating SaaS and Cloud providers, how can you choose the right partner and e… https://t.co/sKcA0DXkvN
19th Feb: "Threat hunting means that you have a recurring process that is aimed at testing individual processes of companies… https://t.co/tYti8hNyfr
18th Feb: Endpoint detection and response (EDR) solutions are crucial for fighting against targeted cyber attacks that often… https://t.co/FurMMxboZc
18th Feb: A growing number of cyber attacks on businesses can be traced back to human error. Our Cyber Security Crash Cours… https://t.co/S8DWapWPQU
17th Feb: Cyber weapons are the perfect weapons. Listen to @Mikko explain how they get the job done in a way that no other… https://t.co/R7Vt6NUxU5
17th Feb: Securing the crown jewels of your business – your production facility, intellectual property, sensitive data, and t… https://t.co/0dUrQls0rv
16th Feb: "Criminals are not after you, criminals are after money, and if it’s too hard to get into your network, they will c… https://t.co/OUgYilF9sv
15th Feb: A weekend reminder from our @jarnomn: Stick to the official app stores. "If you don’t install pirated apps these… https://t.co/WKlNUAUxCN
13th Feb: Our Annual Report for 2018 has been published - Business in strategic growth areas performed well - Corporate secu… https://t.co/wxzgqOdQAL
13th Feb: "Internet safety starts with having a conversation with your children about how they use the web and social media;… https://t.co/TqT7wLE0jx
13th Feb: Our Q4/2018 financial report is out. "F-Secure’s corporate security revenue grew by 48% in Q4, and we made good pro… https://t.co/bH2qmtB2vW
12th Feb: On the latest episode of our #CyberSauna podcast, @Mikko Hypponen discusses governmental APT actors, why words matt… https://t.co/F0jzyKgrGe
12th Feb: "AI adoption is helping businesses to automate their detection and response with unparalleled precision, thereby en… https://t.co/czmwoxkBqq
12th Feb: The network perimeter is in flux, and securing it requires a different approach compared to years ago.… https://t.co/kxKhOSLcK0
11th Feb: Trying out a dating app? Three things you may want to keep in mind: 1. Share "carefully" 2. You could just obfus… https://t.co/hLn81vPgQj
11th Feb: “A targeted attack is a probability. But someone leaving their phone or their laptop in a taxi or on the train, tha… https://t.co/6WRGtChFJm
10th Feb: How to infiltrate a network and other things we teach new cyber security recruits https://t.co/hp4tiktyMt https://t.co/PEBvNSN4R7
9th Feb: The internal IT network is the most common entry point for any attacker into your critical systems. #TheHunt… https://t.co/Y9vTajqZlF
8th Feb: If you don’t find the fact that an European privacy directive was enacted in 1995 impressive, consider this: As of… https://t.co/7f50CLjg82
7th Feb: Google is using Machine Learning to stop more than 100 million pieces of spam a day https://t.co/czMcKDg4zo A prud… https://t.co/8y9hqMXnHn
7th Feb: “...massive hype and over-sensationalized or over-exaggerated headlines in the news, and claims from marketers, has… https://t.co/rKx6tQC8vo
6th Feb: How to use a phishing email with a malicious payload to establish a foothold and C2 (Command & Control) channel… https://t.co/SDKCkXe5J1
5th Feb: How we teach fresh F-Secure talent to infiltrate networks #FSecureLife https://t.co/hp4tikbXUV https://t.co/PEBvNSvtZz
5th Feb: Do you talk to your child about cyber threats or cyberbullying? #SaferInternetDay
5th Feb: "Being able to distinguish between what is an incident and what isn’t in a timely fashion is the key difference bet… https://t.co/PMLB1dgVCy
4th Feb: Almost 3 billion credentials have leaked in the last few weeks. Are your passwords secure?… https://t.co/k89lSjYJcs
3rd Feb: What does it take to create a key that owns electronic hotel locks are the world? At @Disobey_fi, @TimoHirvonen an… https://t.co/CgtcU7Ubse
3rd Feb: "My own point of view is that it’s a fantastic start in treating privacy as a human right." The past, present and… https://t.co/EKwKeBCn2h
2nd Feb: 5 reasons you should be on a VPN now 1. Hiding your IP address 2. Changing your location 3. Encrypting your traffi… https://t.co/9ICt1x2QZj
2nd Feb: "We’ve seen it multiple times that companies try to defend themselves against the most outlandish scenarios, where… https://t.co/4BlXbpCMx9
1st Feb: “I would submit that, until someone has actually worked with machine learning – written and run code, or played wit… https://t.co/3wujmtuZlB
31st Jan: Thanks for awarding your "Excellent" rating to F-Secure Protection Service for Business, @PCMag. *Excellent detec… https://t.co/rlxR6yZqel
31st Jan: Financial gain (53 %) and industrial espionage (47 %) are the main motives behind cyber attacks on the manufacturin… https://t.co/adsaXb4FRK
30th Jan: "In a global economy where personal data is controlled either the Silicon Valley way or the Chinese government way,… https://t.co/JczZSvCbOf
29th Jan: t’s hard to know if anyone exploited the FaceTime bug maliciously, said @ekoivune, chief information security offic… https://t.co/JiwAkvuEg5
29th Jan: Greeting our new Fellows with 60 pizzas... (Yes, we are hiring ---> https://t.co/9FtqIyd6iy…/about_global/careers/… https://t.co/wAaDpwoUTK
29th Jan: What exactly is threat hunting, and why is it important? https://t.co/k89GJYu27z https://t.co/JyVg6fsXJ7
29th Jan: OPSEC tip: Turn off Facetime. https://t.co/k5qotNThEf
28th Jan: Tweet your #MyPrivacyTip before 11:59 EST and you could still win. https://t.co/qJTREEyJdm
28th Jan: To celebrate Data Privacy Day this year, we are taking a look at the past, present and future of GDPR:… https://t.co/Rqp0PLfB6K
28th Jan: Happy Data Privacy Day! Share your favorite privacy tip with the hashtag #MyPrivacyTip and you could win this t-sh… https://t.co/piBOJHwnvY
28th Jan: "To sum it up, this is a very good security program." -@TechForTechs We received Gold Award from TFT! Check out th… https://t.co/SWzB0lPYJy
27th Jan: AI and machine learning feel new, but the first artificial neural networks emerged in the mid-twentieth century. An… https://t.co/ICo0oUYKQi
26th Jan: The internal IT network is the most common entry point for any attacker into your critical systems. #TheHunt… https://t.co/IVXu14lhmx
24th Jan: On the latest episode of our #CyberSauna podcast, red teamer @0xtosh explains how the best defense is a good offens… https://t.co/Da4uPbSQfH
24th Jan: And yes, we are hiring... https://t.co/aY4NM7yhKv https://t.co/TteygkAHsC
23rd Jan: Data dumps like Collection #1 -- which includes 773 million emails & 21 million passwords -- are circulated among c… https://t.co/7NpYHU2sx6
22nd Jan: #10yearschallenge Conficker. https://t.co/gH8DFf7h9P https://t.co/YUoMrbXHy0
22nd Jan: “Secure doesn’t mean invulnerable to exploitation. And SCP is no exception. Users need to manually verify the host… https://t.co/4y5qm3qw7C
20th Jan: “Breaking things makes the world a better place” https://t.co/5JKCnH2Bgo https://t.co/pCPzKL4OeG
19th Jan: Have you find out if your part of Collection #1, the latest HUGE email/password dump? And since the next breach is… https://t.co/O5Rbj5J1cc
19th Jan: Take a trip with @Mikko to find the creators of Brain, the first PC Virus, in Pakistan. https://t.co/x4ANDblaVs https://t.co/bTM0Z7Cxox
19th Jan: Researcher warns of weak SCP security after discovering vulnerabilities Is open source software secure enough for… https://t.co/xHSIgFy9kF
18th Jan: Nice. F-Secure has been nominated for the Channel Awards in the category "Best Security." We need your support!… https://t.co/hFcXd7F74n
18th Jan: “Typically, we think of technical solutions and we forget that people are actually part of the picture, and social… https://t.co/IcJ62kxVIt
18th Jan: Are you part of "Collection #1", the latest HUGE email/password dump? Read more: https://t.co/SX982YaNAF… https://t.co/JifcK5TAXC
17th Jan: “Breaking things makes the world a better place” - @lllarppa https://t.co/5JKCnH2Bgo https://t.co/1brRURlZ1x
17th Jan: Conficker is no longer the more prevalent malware family detected by @FSLabs, as it was for much for this decade.… https://t.co/mTgOjbp4JM
16th Jan: “It’s such an easy thing to take for granted that virtually nobody really checks this, so there will be attackers t… https://t.co/wztye1kZt4
15th Jan: Facebook is using reinforcement learning to figure out when users should receive notifications. Other companies are… https://t.co/Hav30BixAa
14th Jan: Your old router is an absolute goldmine for troublesome hackers “The criminal community has woken up to the many h… https://t.co/vviPs8ewGG
14th Jan: “We’re putting large parts of our lives in the hands of others, where we don’t always realize how much we’re relyin… https://t.co/B0yjBiJjDK
13th Jan: Securing the crown jewels of your business – your production facility, intellectual property, sensitive data, and t… https://t.co/2RJe6Wx7as
12th Jan: How vulnerable are critical infrastructures in cities – and how can we ensure more security? Our @0xtosh explains.… https://t.co/8v6iywosn6
12th Jan: Today at #Disobey19... Think Security 11:30 Overflow Worksop with F-Secure security experts… https://t.co/kF0GXd81RU
9th Jan: In brief: We respect your right to privacy. We encrypt your data traffic. We do not share nor sell any of your tr… https://t.co/8ExBxNLlka
9th Jan: What kind of videos would you like to see on our Connected Life YouTube channel in 2019? 👀 Answer below! (Or if yo… https://t.co/aHcVzNz6G4
9th Jan: Want to know how to secure the connected home? You can still catch our @pgpalmer67. Focus on the Experience: Inte… https://t.co/52F1gFwD4A
8th Jan: New year. New Reverse Engineering course! https://t.co/fSUZoXeh6H https://t.co/HyQB80jlrF
8th Jan: 10 years ago, Conficker—AKA Downadup AKA Downup AKA Kido—was on its way to infect millions of PCs around the world.… https://t.co/t8bEJj9p9z
8th Jan: Not only does vulnerability management lower costs for your organization, but it raises the cost structure for an a… https://t.co/HqNvOEe4z5
7th Jan: Securing the crown jewels of your business – your production facility, intellectual property, sensitive data, and t… https://t.co/leooVrWNtf
5th Jan: This is not the only case of EternalBlue being used for the purpose of cryptojacking. https://t.co/wGnuqqMhJd https://t.co/DmJFMraBYq
2nd Jan: Supply chain attacks, IoT exploits, and other trends coming in 2019 https://t.co/Mv6d1p8WNx https://t.co/4JVT5WKKeE
1st Jan: What do you think was the biggest cyber security story of 2018? https://t.co/jqNWUIl612
31st Dec: Great @WIRED story on a vulnerability in hotel keycard gave a burglar the opportunity of a lifetime.… https://t.co/bbLQSXKwqu
31st Dec: Financial gain (53 %) and industrial espionage (47 %) are the main motives behind cyber attacks on the manufacturin… https://t.co/6M6NN8PHHG
31st Dec: “You can’t just prepare for one kind of cyber attack" and other lessons from the biggest cyber security stories of… https://t.co/xqxzvAlbp3
25th Dec: How are you helping secure your family over the holidays?
25th Dec: To all who celebrate from all of us, we wish you a very merry and secure Christmas. https://t.co/dKUaFQEhoB
24th Dec: This year we celebrated our 30th year of making attackers unhappy. The history of F-Secure is the history of our… https://t.co/LJvxkv3oQW
24th Dec: "This year we have seen devices being exploited from just poor password policies, to remote code executions, to DNS… https://t.co/tuXp4qZTbE
23rd Dec: “Our customers pay us to find and exploit their weaknesses, and report to them about what we did, why we succeeded,… https://t.co/xCbleSb5je
22nd Dec: 3 cyber security takeaways from 2018 Mobile phishing is getting traction with companies Privacy was a big deal, f… https://t.co/WnYW3ARlMD
22nd Dec: It takes an average of 100 days until known security vulnerabilities are remediated #TheHunt… https://t.co/JWDT7dTIuS
21st Dec: "What happens after you’ve been breached is what counts – how fast you detect it is crucial so that you minimize da… https://t.co/FWP25ubo0w
21st Dec: "The target here were IoT Christmas lights which is not exactly a high value target. However they presented a numbe… https://t.co/djSWy8M7sw
20th Dec: Mobile phishing, privacy matters and ransomware in retreat 3 huge cybersecurity trends of 2018… https://t.co/ghEWz9JaR4
20th Dec: "And I of course hope that continues because we want that price of attack to go up." - @0xtosh #CyberSauna… https://t.co/oYCSf1ucKT
19th Dec: Lower your cost, raise your attacker’s cost https://t.co/yP54MmxS0Q https://t.co/NT1A3Bf0Q9
19th Dec: Spam is the most common method for cyber criminals to spread malware in 2018. Roughly 69 percent of spam emails a… https://t.co/6vVO9vCVRz
18th Dec: Before you get your news gear, get your family the gift that protects all your: *Devices and PCs *Passwords *Priva… https://t.co/6gmeer6gwh
17th Dec: " I think the most noteworthy trend that we observed in 2018 was probably the rise in the mobile phishing threat to… https://t.co/Becn2isOs5
17th Dec: "If they are getting a new tablet, phone or laptop for Christmas, you might want to purchase F-Secure Total Interne… https://t.co/7TPpIK9uQp
16th Dec: Confessions of a red teamer “Our customers pay us to find and exploit their weaknesses, and report to them about w… https://t.co/CaK7p4xJRF
16th Dec: Financial gain (53%) and industrial espionage (47%) are the main motives behind cyber attacks on the manufacturing… https://t.co/YNGUD7b6I6
15th Dec: "Ethical hackers use the same techniques as real-life attackers in order to find vulnerabilities and weaknesses to… https://t.co/bW5CQBjRdr
14th Dec: Facebook has revealed a new "bug" that could have exposed the private photos of almost 6 million users.… https://t.co/YpE6J0at54
13th Dec: One big reason "Attribution is an art"... “Nation states use each other’s attacks because they work.” #TheHunt… https://t.co/SuvNW16zX1
13th Dec: Now for something completely different! Our reseller Janne is cycling this whole day as a part of charity events h… https://t.co/SSXp9RE9mq
13th Dec: As defenders of the company network, we need our protection mechanisms to succeed everywhere, all of the time. Me… https://t.co/yMEEqCtdav
12th Dec: One in Four Americans Have Experienced Cybercrime https://t.co/KAQUo1XR25 https://t.co/XHxjk3L09c
12th Dec: Would you click on this? https://t.co/MEQussSwx7
12th Dec: “The million dollar question is, what’s so hard about writing secure code?” #FSecureLife https://t.co/DQTZrD9FKJ https://t.co/TJF5afTXQp
11th Dec: "From state-sponsored adversaries attempting significant thefts from central banks to numerous complex and aggressi… https://t.co/w1bH9WDRLU
11th Dec: Holiday shopping season is also holiday shipping season. And spammers know it. Here’s what you need to watch out… https://t.co/VNLce9869g
11th Dec: “Every company wastes about 25% of their information security budget. The problem is that companies don’t know whic… https://t.co/AsQVtn9ahk
10th Dec: Even the best security systems can still be compromised. "You need to train your employees in security, because t… https://t.co/Pm7bq1N2b9
10th Dec: Fascinating behavioral science here that explains why we may be more vulnerable to phishing on our mobile devices p… https://t.co/V5CQe8OGUX
10th Dec: Check out F-Secure Connected Life -- the channel with the latest inside news from the world of security and techn… https://t.co/CGyojk7nnz
10th Dec: "Young women don’t get into coding at the same rate as men, and #HiveHelsinki sounds like a great way to make the f… https://t.co/jayGlxUGcf
9th Dec: "Ethical hackers use the same techniques as real-life attackers in order to find vulnerabilities and weaknesses to… https://t.co/JucSy1O74F
9th Dec: What would you type at the prompt? https://t.co/MH6xWIgGRm
9th Dec: “Companies should assume a breach and with that assume that their database of valuable information can be stolen by… https://t.co/eGS3LBfp0Z
8th Dec: F-Secure is proud to be a part of the launch of #HiveHelsinki – a tuition-free private school that aims to make lea… https://t.co/gwmOS8BocR
8th Dec: "Companies should assume a breach and with that assume that their database of valuable information can be stolen by… https://t.co/TL5irI959f
7th Dec: Thanks to everyone who came out and saw Salesforce demonstrate F-Secure Cloud Protection at #Slush18. You can chec… https://t.co/ooJYFGOKR2
7th Dec: "Books are important, but it’s not the whole library,” Ms. Soininvaara said. She pointed to Oodi’s recording studio… https://t.co/aRZZfpjChF
7th Dec: “Security starts from the source code." #FSecureLife https://t.co/DQTZrDrh9j https://t.co/o0uhhppBTT
7th Dec: "3ve” is a cyber crime operation that used malware and hijacked IP addresses to direct internet traffic from roughl… https://t.co/baKRqDINiU
6th Dec: F-Secure Security Advisor @5ean5ullivan doesn’t believe publishing the decision process behind releasing government… https://t.co/Pm8R7kAva0
6th Dec: “Most malware comes in through e-mail. Do your employees who receive e-mail receiving need be connected to mission… https://t.co/E9i8V8s1tx
5th Dec: #ProTip: You can subscribe to our #CyberSauna podcast through RSS: https://t.co/tJ5fT8uWO9 SoundCloud:… https://t.co/KUwWn5FhEC
4th Dec: Why Quora is rushing to let you know 100 million users may have been hacked https://t.co/9EM4SesRQX https://t.co/Y0a1vCkFR7
4th Dec: It begins... now. #BlackHatEU https://t.co/B5pBtyGsg6
3rd Dec: The most worrying effect of expanding cyber espionage is the long-term negative impact on our knowledge-based socie… https://t.co/QMjJQmtlR6
2nd Dec: “Companies should assume a breach and with that assume that their database of valuable information can be stolen by… https://t.co/zuImwZ1KT6
1st Dec: “A lot has been written about WannaCry & NotPetya, but people don’t write about what happens behind the scenes. The… https://t.co/ZAqEix8H4O
29th Nov: “And once a device is part of a botnet, it leaves them open for future attacks. So users should avoid risking any t… https://t.co/kLRsVGUDMb
29th Nov: #CyberSauna -- what school would be like if hackers taught it, in a sauna https://t.co/b1Ag9KgKzi https://t.co/FtmUcmvcC4
29th Nov: #ThrowbackThursday https://t.co/JGJJJS7t8O
29th Nov: Financial gain (53 %) and industrial espionage (47 %) are the main motives behind cyber attacks on the manufacturin… https://t.co/PCxwzAQWki
27th Nov: BREAKING: US-CERT, in cooperation with the FBI and US Department of Homeland Security, issued an advisory about a m… https://t.co/74g1wF1b4w
27th Nov: "As these criminals have increased their focus on cybercrime, financial institutions have increasingly become targe… https://t.co/vTJrnhpoFo
27th Nov: “I decided to take the malware home. I infected myself on purpose to see if I could understand how it worked. Then… https://t.co/QGKLutlFws
27th Nov: What is the biggest myth or misconception you’d like to bust about endpoint security or detection and response?… https://t.co/Sx84OBG6kr
26th Nov: An ongoing phishing campaign is targeting French industry, @FSLabs finds. https://t.co/6n4YR95g4l https://t.co/hH8t6kw1E9
25th Nov: Last days! https://t.co/r3lafhc8gE
25th Nov: Sleep mode is vulnerable mode. When a computer goes to sleep, information stays in the random-access memory (RAM),… https://t.co/gvzsMo1enk
24th Nov: “In cyberspace, almost anyone can see your screen.” #FSecureLife https://t.co/JLpnsRS2a0 https://t.co/ePwvhzz1KE
24th Nov: Q: How likely is it that an organization will encounter the kind of attacks that are out of scope for endpoint prot… https://t.co/W1WmOMwQAL
23rd Nov: SAVE 50% FOR BLACK FRIDAY! Get half off FREEDOME VPN and TOTAL with coupon code BLACKFRIDAY.… https://t.co/aCLIQIj6Fl
23rd Nov: "In the future, devices, equipment & robots running real-time operating systems will require local 5G networks... A… https://t.co/JDPVeKIKmA
23rd Nov: Use one specific browser for all of your shopping and financial transactions and other online shopping tips for… https://t.co/WB0EYvdsWN
23rd Nov: Even the FBI and Interpol have tried to make the case to internet users that they should not assume #connectedhome… https://t.co/rs0dreiwD9
22nd Nov: "The most worrying effect of expanding cyber espionage is the long-term negative impact on our knowledge-based soci… https://t.co/bOzZ8RyRpw
21st Nov: Though Finland makes up less than 0.1 percent of the world’s population, the country has seen about 10 percent of t… https://t.co/wz5qxrwfml
21st Nov: TIPS: How to avoid skimmers and scammers while shopping online #ThanksgivingEve https://t.co/xkW0DpuWXP https://t.co/vqVeyzQuB5
21st Nov: 25 years later and still hiring. #ITjobs https://t.co/aY4NM7gGlV https://t.co/8TiyBazyL5
21st Nov: OUR BLACK FRIDAY DEALS ARE LIVE! Get 50% off from FREEDOME VPN and TOTAL subscriptions with coupon code BLACKFRIDA… https://t.co/kYISAJfbNX
21st Nov: "It’s happening right now to most of the organizations on the planet. If you have a custom website, you have a web… https://t.co/QUKxZoMkH4
20th Nov: NEW RELEASE: F-Secure Rapid Detection & Response backs up companies fighting intruders #TheHunt… https://t.co/rHqgIOGaxq
20th Nov: It’s common that the company operating the production facility doesn’t even know where their actual perimeter is.… https://t.co/uqMamRU8YC
19th Nov: How is your company doing at protecting your endpoints? We’ve created a quick and easy quiz so you can find out w… https://t.co/Skjk8Sdw4r
18th Nov: Three Principles for Successful AI Solutions 1) There is no silver bullet 2) Know your models 3) Training is key… https://t.co/c1JreAovTr
17th Nov: "The good news is, we’re not seeing the attackers using machine learning. Not yet. One day they will become so acce… https://t.co/263sEcB4Cf
17th Nov: SPOILER: These are not good password tricks. https://t.co/GiCQrYDb62 https://t.co/dCbKUqoUBX
17th Nov: Sean Sullivan, security advisor at F-Secure, said DHS cyber reorganization is “long overdue” “Everything is ‘cyber… https://t.co/uhymbgguX3
16th Nov: Magecart become close to a household name with hacks of massive sites like https://t.co/p3eIy79v6v,… https://t.co/Wh3AfFois0
16th Nov: “And when everything is becoming a computer, companies get hacked in surprising ways,” he said. For an example, he… https://t.co/U046VU67xT
15th Nov: “If you’re not smart, you have to be persistent,” he says. #FSecureLife https://t.co/p8Ez8WyNLL https://t.co/r6eNr4CSGC
14th Nov: Any "non-registered" Facebook users out there? https://t.co/mFN1ldnEB0
14th Nov: Exploits confirmed! Congrats to F-Secure’s @MWRLabs team for another great #Pwn2Own performance. @thezdi… https://t.co/aLBipheNqW
14th Nov: The cost of cyber espionage for EU countries is estimated to be as large as 1−2 percent of GDP annually. https://t.co/HNXAYnGenj
13th Nov: Where others see challenges in the #IoT, we see an opportunity. #CONNEU18 https://t.co/f8pHrsWxrG https://t.co/BkaVwS54G8
13th Nov: Every company has something to protect from cyber crime #TheHunt https://t.co/K3D5YHdaz8 https://t.co/65RA9zwGLc
12th Nov: We’re excited to join companies around the world in supporting the Paris Call for Trust and Security in Cyberspace… https://t.co/EogeNgALuo
12th Nov: “Turning off the computer is like destroying evidence – evidence that can help uncover who the attackers are and wh… https://t.co/dStHciqXzu
10th Nov: If you have some time this weekend, why not begin your career in cyber security? Our Cyber Security Base online c… https://t.co/rH9NqD5QWW
10th Nov: Tomi Tuominen, Practice Leader at F-Secure Cyber Security Services, remembers what you might call his first “hack.”… https://t.co/mAgqSnwDPp
9th Nov: “And when everything is becoming a computer, companies get hacked in surprising ways." https://t.co/aKfsy52tid https://t.co/cqJHgJRdco
8th Nov: 81% of hacking-related breaches leveraged weak, stolen, or default password. What constitutes a weak password?… https://t.co/kMcWInwmMp
7th Nov: Facebook often talks about stricter rules about candidate ads to deflect awkward questions about such “inauthentic… https://t.co/qVE2Fi0Oqc
6th Nov: Think about losing an invention like that just before the product is ready to hit the market. You would lose years… https://t.co/rytSb5u9hZ
5th Nov: "A lot of people in Congress are concerned that the Facebook influence campaigns are about the midterms, but to me… https://t.co/ysJ2mWgC7X
3rd Nov: What kind of topics does the MOOC cover? https://t.co/kcGNnEmrDG https://t.co/0aS0y5itgi
2nd Nov:  ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄| SLEEP MODE IS VULNERABLE MODE |___________… https://t.co/gFsS0pUoqv
2nd Nov: The engine of F-Secure’s Dutch/Belgian operations by day. Author of romances, thrillers, poems, blogs, kids stori… https://t.co/tqXq1wdVFv
2nd Nov: Financial gain (53 %) and industrial espionage (47 %) are the main motives behind cyber attacks on the manufacturin… https://t.co/afH8l68SjA
1st Nov: “It’s also interesting to see that the Chinese Ministry of State Security (MSS) have combined human intelligence an… https://t.co/Kq4XuPXyZx
1st Nov: The company in this cyber crime case was working on a prototype that could stop global warming. Think about losing… https://t.co/0CiUay6Cwe
31st Oct: "So I think in terms of hacking an American election, my biggest concern is that you could crash the election, righ… https://t.co/qjMwbjTemM
30th Oct: Course just started! Find out more: https://t.co/kcGNnEmrDG https://t.co/5WExR4b1oV
30th Oct: Cyber Security Base -- our free course with @helsinkiuni focused on building the knowledge and abilities of a cyber… https://t.co/MHMQx6JzKY
30th Oct: Smart TVs are the most popular consumer IoT device in the world. You can find them in 48% of homes in the United St… https://t.co/JOlQVLBfin
30th Oct: In targeted attacks, it is common that an attacker can stay undetected in the network for a long time.… https://t.co/9B7e3JZZlE
28th Oct: Hacked at work? Unplug the thug #cybersecmonth https://t.co/RoDeiXyxei https://t.co/9lHo1TIotC
27th Oct: Marcin compares the pace of his work to that of a firefighter. When the fires are burning his job is unpredictable… https://t.co/NMEN8hoHbY
26th Oct: Early adopters love the IoT Privacy concerns, however, hold back new investments in smart home devices Early adop… https://t.co/w1F48C1AVp
26th Oct: It is time to acknowledge the security challenges of industrial control systems. 1. It’s difficult to control how… https://t.co/pwjYRsQZQd
25th Oct: It could be the million-dollar question. Do you know how much a cyber security breach could cost you?… https://t.co/DcRIhqAG6m
25th Oct: Have you held off on purchasing an IoT device because privacy or security concerns? https://t.co/IsMY346VS8
23rd Oct: “We had worked over a decade to develop this - interceptor for global warming as we liked to call it. But it was… https://t.co/iFNLKNK7m8
22nd Oct: Nice. F-Secure has been awarded MRG Effitas 360 Degree Assessment & Certification for Q2 with Level 1​.… https://t.co/88ZsTSidqa
22nd Oct: “About a week before the deal, I got a call. We’d been hacked.” Do you know how ready you are for a cyber-attack?… https://t.co/Tm4lkR9s9H
22nd Oct: F-Secure SAFE for Android got 6/6 Protection Score in the latest @avtestorg tests - ranking above industry average!… https://t.co/sBYOvff0fM
19th Oct: Cyber crime damages will cost the world $6 trillion annually by 2021, up from $3 trillion in 2015.… https://t.co/bWXiNVTc5N
18th Oct: Pass It On: Friends Don’t Let Friends Reuse Passwords #CyberSecMonth https://t.co/lPWsi3aZNn https://t.co/PXv54P9SAv
18th Oct: Three Principles for Successful AI Solutions from @MattiAksela, head of the Artificial Intelligence Centre of Exce… https://t.co/2D08GwhyxQ
17th Oct: Nice. We did it again! F-Secure has been awarded MRG Effitas 360 Degree Assessment & Certification for Q2 with Lev… https://t.co/e1Yh2ld423
15th Oct: Overcoming obstacles is a full time occupation for Hannes Saarinen, Data Protection Officer at F-Secure.… https://t.co/yw2X5Wndlh
14th Oct: "For families, SAFE’s attraction is likely to be the Family Rules feature." https://t.co/RYvAX88FSz https://t.co/122xmNDh8K
12th Oct: Have you secured (or deleted) your Facebook account yet? https://t.co/JgWcgJAES3 https://t.co/X6nOxWTCcb
12th Oct: REMEMBER: Sleep Mode is Vulnerable Mode #CyberSecMonth https://t.co/FeeS3j8KIg https://t.co/InZvU9wXyL
11th Oct: Millions of job openings in cyber security are expected in the next few years. So why are just 11 percent of cybe… https://t.co/3bp45RswdJ
10th Oct: Talk to most cyber security pros and the story of their career usually begins with a Commodore 64 or a video game c… https://t.co/i0C46HeYGL
10th Oct: We are at #cybersecuritynordic2018 today and tomorrow. Sip a cup of coffee with us and talk cyber with our experts… https://t.co/Kf4QkfxdR2
9th Oct: For @5ean5ullivan, a security adviser at cyber firm F-Secure, a campaign’s cyber protections boil down to education… https://t.co/8WjzzJE60I
5th Oct: FYI: "password" is the 2nd most popular password in the world. Can you guess the first? https://t.co/847NxvOS28 https://t.co/4vkTmemC6q
4th Oct: NEWS: F-Secure, Zyxel Bringing Secure Wi-Fi to Connected Homes https://t.co/5YKyaSmSNA https://t.co/WGErAf9oSN
4th Oct: WATCH: Top 5 Viruses of All Time by Security Expert @mikko Hyppönen https://t.co/plElMskVb5 #infosec #cybersecurity https://t.co/zqLobVhAtT
3rd Oct: Introducing... THE HUNT: A Cyber Attack in the Process Industry #cybersecurity #thehunt https://t.co/aROeiK0N8p https://t.co/tN5mwLElEc
3rd Oct: In 1999, AV-TEST reported that there were 98,428 total unique malware samples. Today, AV-TEST registers over 350,… https://t.co/FQMpp66pD7
2nd Oct: F-Secure’s Poznan Rule #1: “Always lock your laptop. Unless you want to buy donuts for the office.” #FSecureLife… https://t.co/TS9hAnBznA
2nd Oct: "[T]he true severity of the breach will likely not be known until Facebook sheds more light on the incident, includ… https://t.co/bAY3WyT8uT
1st Oct: “It’s all about finding patterns in the big mess of data that’s fed into our systems. That makes it easier for us t… https://t.co/4NNNx1ofCl
1st Oct: Why prevention and detection & response go hand-in-hand https://t.co/BPwjeIVpD7 https://t.co/pNOxQ47WlH
30th Sep: Things that didn’t exist in 1999: iPad Snapchat iPhone Facebook Youtube Instagram Uber Android Slack The Xbox Amaz… https://t.co/VNEHXaSBUp
30th Sep: Meet Anssi Kuortti, F-Secure’s multi-talented, unassuming, and unconventional HR specialist who has been with us fo… https://t.co/vydq2tp1ly
29th Sep: “We were able to reconstruct the user’s activity from the web browser. It showed that they did open that email and… https://t.co/HDdAwvULMi
28th Sep: "I don’t know why Finland specifically attracted me. Santa Claus, the cryptic language, the overdose of metal bands… https://t.co/gCDn5pJM7v
28th Sep: What do you miss most -- or least -- about the internet of the 90s? https://t.co/mTpjTdOhjC https://t.co/BSlTmpXK2p
27th Sep: "But what we usually start with is using some sort of OSINT, meaning open source intelligence. We go through DNS re… https://t.co/L1X7dDuD3Q
26th Sep: "I have previously reviewed F-Secure TOTAL, and it remains my favourite security suite on the market."… https://t.co/kkqpoqcuTu
26th Sep: Impress your friends. Disappoint your enemies. Get a crash course in cyber security. https://t.co/8KbNbWMuxP https://t.co/472NXHDrcs
25th Sep: Is it even possible to make security simple in today’s complex world? https://t.co/7UkUu3OTBH https://t.co/wkNtA2SxP9
24th Sep: “Their account was breached after getting what looked like a genuine email about a parcel delivery. In reality, it… https://t.co/92Wbu3kexl
24th Sep: Strengthening your organization’s preventive measures and vulnerability management capabilities helps streamline th… https://t.co/XPqnkHSrVU
24th Sep: Premium @FSecureKEY... *Makes it easy to use unique, strong passwords every account *Keep youe passwords up-to-… https://t.co/AZEnn6rh49
23rd Sep: 22 years of fellowship, football and food #FSecureLife https://t.co/fujieinHTd https://t.co/eMVQkjJNyp
23rd Sep: 3 Tips for Simple Security in a Complex World https://t.co/wkNtA2AWXB
22nd Sep: Early prevention helps smooth your detection and response processes. But not only that, it’s actually the most cost… https://t.co/4cnAU9050G
21st Sep: The researchers say that attackers able to gain physical access to a targeted computer can exploit this weakness to… https://t.co/F19fM6mhkK
21st Sep: Remember When Viruses Only Lived on Floppy Disks? https://t.co/OkqgR2ATl7 https://t.co/4tkc7ioJ5K
20th Sep: "Because once your biometric signature gets leaked, it’s really damn hard to get new fingerprints." #CyberSauna… https://t.co/1asdqwa58q
19th Sep: "Now, she not only helps make F-Secure products awesome, she speaks at about 20 international conferences around th… https://t.co/KnNzF4WYCy
19th Sep: But the main concerning factor is that to exploit this vulnerability, the attacker would need only 5 minutes at max… https://t.co/EhZzExVz0r
18th Sep: Sorry, we only have global numbers. But we can tell you that "f-secure" comes in at number 17,519,492 on the list o… https://t.co/IDkpF13Yvg

YouTube

16th Mar: Join F-Secure!
10th Feb: Griffin Trailer

Get the best Coupon Codes & Deals to your e-mail...

Log In
Welcome back, you can log in below...

Sign Up
Get the benefits of registered members. Benefits include exclusive coupon codes, your own list of favorite stores or bonus program. And much more...

Error:Email not entered correctly.
Error:The password must be at least 5 characters.
Error:The passwords do not match.

I agree to Privacy Policy.

Forgot Password?
Did you forget your password? Nothing happens! We will send you a new one...

How to Use a Coupon?

1. Finding coupon

Once you find a coupon to your favorite store or merchant, you can click to view and copy the code.

2. Applying coupon

Enter the code on the merchant’s website and you get the discount.

3. Saving money

It’s that simple. The discount is deducted from the price and you save money.

Store Owner Sign Up
Sign up as manager of the store. You will then have the possibility of modifying and adding new offers directly for your store.

Email must be under the domain of store. Within 24 hours you will receive the access data.

Tags - F-Secure.com
Search using tags helps visitors find the right deal. Here you can edit the tags for this store. New labels will start running within 24 hours.