Suspicious Behavior

Find SophosLabs data about viruses, spyware, suspicious behavior and files, adware, PUAs, and controlled applications and devices.

Files that are already executing and behaving questionably are detected as suspicious behavior, while files that look untrustworthy before they execute are detected as suspicious files.

In this section, you will find information about these two forms of detection. Files flagged as suspicious are likely to be malicious, but it's up to you to decide whether to trust them.

RSS Runtime detection of suspicious behavior

Buffer overflow detection

We treat buffer overflows with suspicion, because they can be a form of run-time attack that enables malicious code to gain unauthorized access to a system. However, not all files or processes that overflow buffers are security risks.

If you are confident that the buffer overflow is not a threat, then authorize it. If you're unsure, then send the file to SophosLabs for analysis.

RSS Pre-execution detection of suspicious files

If you're unsure about the status of a file, send the file to SophosLabs for analysis.

Submit a sample

download Try Sophos products for free
Download now

Security Threat
Report 2014

Smarter, shadier, stealthier malware
Download now