Counterpsy Considers Bitdefender As A Spyware

Hi to all !


Do you have Counterspy ? a nice antispyware sofware.


however, it considers Norman Ad-Aware and Bitdefender2008 as potentially hazardous software.


Now it underscores the file Bitdefender2008\buypch.exe as a Trojan.Win32.package.Gen !


I'm quite puzzled !


Have you eve had such incorrect answers and mismatch with these software ?


Nice evening to all


Lionet :blink:

Comments

  • False positive !

  • Hi to all !


    Do you have Counterspy ? a nice antispyware sofware.


    however, it considers Norman Ad-Aware and Bitdefender2008 as potentially hazardous software.


    Now it underscores the file Bitdefender2008\buypch.exe as a Trojan.Win32.package.Gen !


    I'm quite puzzled !


    Have you eve had such incorrect answers and mismatch with these software ?


    Nice evening to all


    Lionet :blink:


    Thank you, Lionet, for signaling this situation to us. All necessary steps have been taken in order to correct this. We are talking about a false positive from Counterspy that will probably be resoved ASAP.

  • rootkit
    edited February 2009

    A big FP had Dr. W** with BitDefender Contextual Scan a few months ago :)

  • Thank you, Lionet, for signaling this situation to us. All necessary steps have been taken in order to correct this. We are talking about a false positive from Counterspy that will probably be resoved ASAP.


    We have received confirmation that with the latest updates, our file is no longer detected as suspect/infected.

Featured content

bitdefender review banner

Romance Fraudster in UK to Spend 2 Years Behind Bars

A serial romance fraudster was sentenced to 28 months in prison for conning several women out of £20,000.

Read more
bitdefender review banner

Europol Shuts Down Hackers’ Favorite VPN Service

Europol earlier this week coordinated joint action to take down VPNLab.net.

Read more
bitdefender review banner

Top Five Security Tips for Mac Users in 2022

In this simple guide, we look at five basic cybersecurity hygiene practices every Mac user should read, and use,in 2022.

Read more