Login or sign up Lost password?
Login or sign up
Such engines use a vast library of data on known threats and compare it to the files on your computer and web pages to see if they look like, or behave like, threats.