Home Page | Skip to Navigation | Skip to Content | Skip to Search | Skip to Footer

Reporting Spyware

Reporting and submitting suspected Spyware samples helps Check Point increase the security and protection of all users.

You can submit a Spyware sample file to the Check Point Security Team for analysis. Send the malicious file in a password protected zip archive. Set the zip archive password to: infected.

The Security Team will respond to your submission as is appropriate and may contact you for more information or to provide details back to you about the files you submit.

Note: Do not send malicious files to others. Do not submit a Spyware sample file to the Security Team if you feel you can not do so safely. Sending malicious files unsafely increases the risk of infection or may damage your system.

Report Detection Issues
Reporting missed and false positive detections helps Check Point increase the security and protection of all users with the most accurate and thorough threat information.

Missed Detections
New Spyware is released everyday. Although Check Point makes every attempt to detect and protect against newly released Spyware, it is possible the Spyware Scanner could miss a new Spyware threat. If you have come across what seems to be un-detected Spyware, you can report such detection to the Check Point Security Team.

To submit your missed detection issue, send an email to Check Point Security Team for analysis.

Ensure that your detection report email includes the following information:

  • Name of software
  • Download location (URL if known)
  • Your name
  • Your email address

The Security Team will respond to your submission as is appropriate and may contact you for more information or to provide details back to you about the detection issue you submit.

False-Positive Detections
Sometimes the Check Point Spyware Scanner inappropriately detects an application as Spyware. If you have come across what seems to be identified as malicious Spyware, but in fact it is not, you can report such detection to the Check Point Security Team.

To submit your false-positive detection issue, send an email to Check Point Security Team for analysis.

Ensure that your detection report email includes the following information:

  • Name of Threat Detected
  • Name of Legitimate Program
  • Download Location If Known
  • Version of Legitimate Program
  • Filename, Registry Keys, or Other Item Being Detected
  • Your name
  • Your email address
The Security Team will respond to your submission as is appropriate and may contact you for more information or to provide details back to you about the detection issue you submit.