Browse our Knowledge database to discover what's new about viruses malware and fishing techniques. Stay up-to-date about latest threats.
When analyzing a threat, we use 5 criteria: behavior, privacy, distribution, removal, and integration. Learn more about the analysis process and criteria.Read more
Different types of spyware and malware present different types of threats. When you complete a scan, each threat is classified under one of the categories.Read more
We develop and deliver high quality anti-spyware solutions. Threat Analysis (TA) process enables you to understand what constitutes an annoying threat.Read more
Identity theft or fraud: Scamming for information is nothing new, but the Web provides a fresh means of fraud, identity theft is a fast-growing. Learn moreRead more
By not fully reading software license agreements, you may be in danger of installing unwanted material. Learn more about End User License Agreements EULA.Read more