Knowledge database
Browse our Knowledge database to discover what's new about viruses malware and fishing techniques. Stay up-to-date about latest threats.
Threat analysis index criteria
When analyzing a threat, we use 5 criteria: behavior, privacy, distribution, removal, and integration. Learn more about the analysis process and criteria.
Read moreThreat Analysis Index Categories
Different types of spyware and malware present different types of threats. When you complete a scan, each threat is classified under one of the categories.
Read moreThreat analysis index
We develop and deliver high quality anti-spyware solutions. Threat Analysis (TA) process enables you to understand what constitutes an annoying threat.
Read moreProtecting your identity
Identity theft or fraud: Scamming for information is nothing new, but the Web provides a fresh means of fraud, identity theft is a fast-growing. Learn more
Read moreA Closer look at EULAs
By not fully reading software license agreements, you may be in danger of installing unwanted material. Learn more about End User License Agreements EULA.
Read moreA Closer Look at Zlob Trojans
The war against Zlob Trojans : this enemy goes by many names (Zlob, fake codecs, Zlob codecs, Smitfraud Trojans). Learn more about Zlob family of Trojans
Read more