Skip to main content

F-Secure Exploit Shield now available

F-Secure has announced a technology preview program of its latest Exploit Shield technology, which is now available for free download for testing purpose. This application safeguards users from web-based malicious exploits, driven by downloads or by vulnerabilities in IE or Firefox browser and stops malicious programs such as Trojans, spyware, worms, viruses, backdoors, etc (malware) at the first point of infection.

Exploit Shield provides protection against ‘zero-day’ attacks, which is come to pass in unpatched machines. Since a zero-day exploit patch is not really available from the software vendors and an open security hole in software always allows exploitation, F-Secure Exploit Shield has greater importance, because it ensure protection against these attacks even before patches are available from the software vendor.

The highlights of the F-Secure Exploit Shield include: “Protects unpatched machines even before patches are available from the software vendor, One 'shield' update per vulnerability stops all exploits targeting it, Heuristic detection techniques block exploits even for unknown vulnerabilities, Protects against both malicious websites and good websites that have been hacked, Automatically sends detected malicious URLs from users to F-Secure”.

The F-Secure Exploit Shield (beta) can be downloaded from and it likely to incorporated in F-Secure security solutions in around 2009.


Popular posts from this blog

Surf the Web Anonymously With Firefox Add-on Phproxy

There are several web based proxy servers available to surf the internet anonymously or as from another country. The Firefox add-on (Firefox 3 – 4) Phzilla helps you view a webpage or surf the internet using the PHProxy (a type of web based proxy server) proxy servers. It is very easy and convenient to use.

Restore Lost Capacity Of Your USB Flash Drive (How to)

Some malware can hide full capacity of your USB flash drive. For example, a 4GB pen drive sometimes shows only 500kb or less. An interesting part of this situation is that, even after removing the malware or formatting the USB flash drive, you will not get back its original capacity. Therefore, the question here is how to restore a USB flash drive to its full capacity.

Privacy Policy

We at give prime importance to our users’ privacy and are committed to protecting it always. If you have any doubt concerned with our website privacy policy or software, please feel free to contact us. Please read our Privacy Policy below to learn more about how we treat personally identifiable information, how it is protected and used. Log Files: does NOT collect any personally-identifiable information, such as name, address, phone number or email address from users of this web site without their knowledge, and takes measures to protect their privacy. However, like other standard web site servers, we use log files to collect information purely to identify the number of visitors to this web site, what those visitors looked at and how long they spent browsing. These information will only be used to judge the popularity of this web site and to make future improvements.These includes IP address, internet service provider, type of browser, date/ti