Analyzing and categorizing potentially unwanted software is a complex problem. Developers of potentially unwanted software rapidly evolve their products. Some even contain a few characteristics that resemble legitimate software to mask the unwanted functionality. It's an on-going process, and we work hard to identify common behaviors that help provide you the highest level of protection. In some cases, where the behavior is questionable, we will list the application even if it does not neatly fit into the listed criteria. In other words, we use our judgment.
While we highlight potentially unwanted programs, you then make a choice in the exclusions list and select what you want to keep or remove.
Here are some of the criteria we use:
To keep our analysis useful, we regularly update our software with applications meeting our criteria. While we work hard not to, sometimes we get it wrong. If you want to submit your application for reconsideration, please email firstname.lastname@example.org.
For the most part, publishers of potentially unwanted software are not hobbyists. They are sophisticated businesses with big budgets and infrastructure. Given this, new forms of potentially unwanted software frequently emerge and proliferate. To respond promptly, we reserve the right to adjust, expand and update our criteria without prior notice or announcements.
Your intro to everything relating to cyberthreats, and how to stop them.