Useful, legitimate software which could possibly be misused for malicious purposes.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
Detailed instructions for F-Secure security products are available in the documentation found in the Downloads section of our Home - Global site.
You may also refer to the Knowledge Base on the F-Secure Community site for further assistance.
When searching our Virus Descriptions database for a specific program (e.g., Riskware:W32/Example.A), you may be directed to this page if the overview below sufficiently describes the program.
Alternatively, you may be directed to this page if no description matching that specific query is currently available. You can submit a sample of the suspect file to our Response Lab for further analysis via:
Riskware is the term used to describe programs which may introduce security risks to a system, either with or without the knowledge of the user. Examples of riskware include:
- Remote Administration programs - e.g. VNC
- FTP servers
- IRC clients
- Network Sniffers
- Overeager DRM software
Programs that can be categorized as Riskware are often both legitimate and useful. In certain circumstances however, these programs can introduce risks to the user or the system. For example, the program may be distributed bundled together with malicious software, or using the program under certain circumstances may introduce risks not present during normal operations. Additionally, an intruder may be able to remotely subvert riskware already installed in order to access the system.
This category includes software that cannot be included in other malware categories. Some software is not malicious, but does not provide the functionality claimed. If the functionality of software is suspect, it may be added as Riskware.
If the user is aware of the security risks involved and wishes to proceed with installing and using the program, there is no reason not to do so.