A program which uses computer or network resources to make complete copies of itself.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
Detailed instructions for F-Secure security products are available in the documentation found in the Downloads section of our Home - Global site.
You may also refer to the Knowledge Base on the F-Secure Community site for further assistance.
Security programs will sometimes unintentionally identify a clean program or file as malicious if its code or behavior is similar to a known harmful program or file. This is known as a False Alarm or False Positive (FP).
For example, 'tmp.edb' and other '.edb' files stored at the location 'C:\WINDOWS\SoftwareDistribution\DataStore\Logs\' may be unintentionally detected as malicious by various security programs.
In most cases, a False Positive is fixed in a subsequent database release; updating your F-Secure security product to use the latest database is enough to resolve the issue. If you suspect a detected file may be a False Positive, you can check by first updating your F-Secure security product to use the latest detection database updates, then rescanning the suspect file.
After checking, if you believe the file or program is still incorrectly detected, you can submit a sample of it to F-Secure Labs for analysis and correction:
If you are positive that the suspect file is safe and you want to continue using it, you can exclude it from further scanning by the F-Secure security product:
You may also refer to the Knowledge Base on the F-Secure Community site for more assistance.
Microsoft provides enterprise-level instructions for excluding files from scanning by antivirus software:
A worm is a parasitic program capable of replicating by sending copies of itself to new hosts (computers, servers, mobile devices, etc) over a network and other transferable media.
At one time, worms were considered more of a nuisance than a threat, but today it has become increasingly common among malware authors to create malicious, complex worms that can perform malicious activities such as data-stealing or launching Denial of Service (DoS) attacks. Worms may now also be used to deliver other threats, such as viruses or trojans.
There are multiple worm sub-types, which are defined by the platform or medium they use to spread:
Description Created: 2009-07-08 11:59:43.0
Description Last Modified: 2010-08-11 12:31:13.0