If the user is aware of the security risks involved and wishes to proceed with installing and using this program, there is no reason not to do so.
The user may then elect to exclude (whitelist) the application's folder from subsequent scanning.
For instructions on excluding files from scanning, please see:
Product documentation for various versions of F-Secure products are available on the Documentation section of the website.
When searching our Virus Descriptions database for a specific program (e.g., Riskware:W32/Example.A), you may be directed to this page if the overview below sufficiently describes the program.
Alternatively, you may be directed to this page if no description matching that specific query is currently available. You can submit a sample of the suspect file to our Response Lab for further analysis via:
Riskware is the term used to describe programs which may introduce security risks to a system, either with or without the knowledge of the user. Examples of riskware include:
Programs that can be categorized as Riskware are often both legitimate and useful. In certain circumstances however, these programs can introduce risks to the user or the system.
For example, the program may be distributed bundled together with malicious software, or using the program under certain circumstances may introduce risks not present during normal operations. Additionally, an intruder may be able to remotely subvert riskware already installed in order to access the system.
This category includes software that cannot be included in other malware categories. Some software is not malicious, but does not provide the functionality claimed. If the functionality of software is suspect, it may be added as Riskware.