It is not uncommon that an antivirus or anti-malware software program has a f\/p (false\/positive) detection in a scan. In the event a file that has been on your computer for some time suddenly turns up during a scan, the first recommendation is quarantine rather than remove. If it is a f\/p, the file can be restored from quarantine but not easily replaced if deleted, particularly if it is a critical system file.\n\nHow can you determine if the detection is a f\/p? There are various vendors that provide free on-line computer scans but, in this case, we are looking at one particular file. Among the many services Virus Total provides is the ability to navigate to a specific file on the PC and send it to VirusTotal. As you can see by this example, not every service was detecting this Zbot variant when it was submitted. \n\nTo scan an individual file at VirusTotal, just go to https:\/\/www.virustotal.com\/. Navigate to the location of the file on your computer. After the file is uploaded, click the Scan it! button. \n\n \n\nThere is more to VirusTotal than scanning individual files. With so many malicious websites, there are occasions when you may want to check whether a site is safe before visiting. VirusTotal also includes the ability to scan URLs. In addition to the Malware Domain Blocklist being integrated in VirusTotal's URL scanning engine, it also includes hpHosts. \n\nhpHosts is maintained by my friend and fellow Microsoft Consumer Security MVP, Steve Burn. The activities that result in domains being included by hpHosts are described at VirusTotal as follows:\n\n\n\nDomains being used for advert or tracking purposes. \nDomains engaged in the distribution of malware (e.g. adware, spyware, trojans and viruses etc). \nSites engaged in or alleged to be engaged in the exploitation of browser and OS vulnerabilities as well as the exploitation of gray-matter. \nSites engaged in the selling or distribution of bogus or fraudulent applications. \nSites engaged in astroturfing otherwise known as grass roots marketing. \nPersons caught spamming the hpHosts forums. \nSites engaged in browser hijacking or other forms of hijacking (OS services, bandwidth, DNS, etc.). \nSites engaged in the use of misleading marketing tactics. \nSites engaged in Phishing. \nSites engaged in the selling, distribution or provision of warez (including but not limited to keygens, serials etc), where such provisions do not contain malware. \n\n\nThe next time you are unsure of the safety of a website, go to VirusTotal and Scan it!