Skip to main content
I use Iobit´s start menu 8 since long first on win 8 and 8.1 now on win 10.

 

When installing their latest version v3.0.0 from download.cnet.com via Iobits homepage, Webroot Av blocks it as "easybundling.dll pua.spigot" threat.

 

Iobit is notified and says they don´t have problems with other AV´s?

 

Is this a Webroot false positive or something else?

 

rgds

 

Christian Nissen
Hello and Welcome to the Webroot Community!

 

Please Submit a Support Ticket so they can check the file as it sounds to have a PUA added to it: https://community.webroot.com/t5/Techie-KB/How-to-Remove-Potentially-Unwanted-Applications/ta-p/40744

and download.com is famous for adding PUA's/PUP's = Adware: https://en.wikipedia.org/wiki/Potentially_unwanted_program

 

As malware

The term adware is frequently used to describe a form of malware (malicious software) which presents unwanted advertisements to the user of a computer. The advertisements produced by adware are sometimes in the form of a pop-up or sometimes in an "unclosable window".

When the term is used in this way, the severity of its implication varies. While some sources rate adware only as an "irritant",[24] others classify it as an "online threat" or even rate it as seriously as computer viruses and trojans.The precise definition of the term in this context also varies. Adware that observes the computer user's activities without their consent and reports it to the software's author is called spyware.

Programs that have been developed to detect, quarantine, and remove advertisement-displaying malware, almost all commercial antivirus software currently detect adware and spyware, or offer a separate detection module. A new wrinkle is Adware (using stolen certificates) that disables anti-malware and virus protection; technical remedies are available.

Similar adware has also been discovered in certain low-cost Android devices, particularly those made by small Chinese firms running on Allwinner systems-on-chip. There are even cases where adware code is embedded deep into files stored on the /system and boot partitions, to which removal involves extensive (and complex) modifications to the firmware.

 

Thanks,

 

Daniel 😉

Reply