Suspicious files and behavior

When an endpoint security solution scans files, it labels them as clean or malicious. If a file has a number of questionable characteristics or behavior, it is labeled as suspicious.

Suspicious behavior refers to files doing questionable things when they run on a computer, such as copying themselves to a system folder.

Runtime protection helps protect against suspicious files by analyzing the behavior of all the programs running on your computer and blocking any activity that looks as if it could be malicious.

(See Buffer overflow)

Back to Security Threats A-Z

Back to Threatsaurus Home

download Threatsaurus: A-Z of Threats
Download now