{"id":14415,"date":"2019-01-25T09:10:04","date_gmt":"2019-01-25T17:10:04","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/01\/25\/news-8167\/"},"modified":"2019-01-25T09:10:04","modified_gmt":"2019-01-25T17:10:04","slug":"news-8167","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/01\/25\/news-8167\/","title":{"rendered":"A user&#8217;s right to choose: Why Malwarebytes detects Potentially Unwanted Programs (PUPs)"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Fri, 25 Jan 2019 16:00:00 +0000<\/strong><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/02\/how-to-avoid-potentially-unwanted-programs\/\" target=\"_blank\" rel=\"noopener\">Potentially Unwanted Programs (PUPs)<\/a>: the name says it all.<\/p>\n<p>While the programs themselves might have legitimate uses, their vendors often use inappropriate methods to drive downloads or hide within a program bundle. At Malwarebytes, we feel we have an obligation to help protect our customers from PUPs by identifying and detecting them and giving the user the right to choose whether they continue using their services.<\/p>\n<p>It\u2019s worth noting that PUP vendors are unhappy when we detect them. Several, including Enigma, have sued us over the detections. Litigation hasn\u2019t deterred us from continuing to flag software that meets our PUP criteria. Fortunately, a federal court in California agreed that customers should have the ability to decide which software runs on their computers and dismissed Enigma\u2019s initial claims. A copy of the Court\u2019s order dismissing Enigma\u2019s case <a href=\"https:\/\/www.malwarebytes.com\/pdf\/press\/OrderGrantingDefendantsMotiontoDismiss.pdf\" target=\"_blank\" rel=\"noopener\">(Case 5:17-cv-02915-EJD Document 105)<\/a> may be found online at our press center.<\/p>\n<p>These disputes do not impact the application of our criteria for PUP detections. We continue to identify to Enigma applications: SpyHunter 4 and RegHunter as PUPs. But another release, SpyHunter 5 changed the application behavior to no longer fit into our PUP criteria. We applaud Enigma for the modifications and hope it\u2019s a permanent change.<\/p>\n<p>We will continue to evaluate software against <a href=\"https:\/\/www.malwarebytes.com\/pup\/\" target=\"_blank\" rel=\"noopener\">our guidelines<\/a> to give our customers the tools to make an informed choice about the software running on their computers. We prefer to give each individual the right to manage their devices. We enable consumers who want PUPs to control that choice while protecting the vast majority of our customers by keeping those programs on our PUP list. We think this is the best possible path for our company and our customers.<\/p>\n<p>Stay safe everyone!<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2019\/01\/users-right-to-choose-why-malwarebytes-detects-potentially-unwanted-programs-pups\/\">A user&#8217;s right to choose: Why Malwarebytes detects Potentially Unwanted Programs (PUPs)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2019\/01\/users-right-to-choose-why-malwarebytes-detects-potentially-unwanted-programs-pups\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Fri, 25 Jan 2019 16:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2019\/01\/users-right-to-choose-why-malwarebytes-detects-potentially-unwanted-programs-pups\/' title='A user's right to choose: Why Malwarebytes detects Potentially Unwanted Programs (PUPs)'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/01\/PUPs.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>By identifying and detecting Potentially Unwanted Programs (PUPs), Malwarebytes protects its users while giving them the right to choose whether they continue using their services. Learn why we do this, and how software programs can be reconsidered as legitimate under our PUP criteria.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/malwarebytes-news\/\" rel=\"category tag\">Malwarebytes news<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/enigma\/\" rel=\"tag\">Enigma<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malwarebytes\/\" rel=\"tag\">Malwarebytes<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/potentially-unwanted-programs\/\" rel=\"tag\">potentially unwanted programs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pup-criteria\/\" rel=\"tag\">PUP criteria<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pups\/\" rel=\"tag\">PUPs<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spyhunter\/\" rel=\"tag\">SpyHunter<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2019\/01\/users-right-to-choose-why-malwarebytes-detects-potentially-unwanted-programs-pups\/' title='A user's right to choose: Why Malwarebytes detects Potentially Unwanted Programs (PUPs)'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2019\/01\/users-right-to-choose-why-malwarebytes-detects-potentially-unwanted-programs-pups\/\">A user&#8217;s right to choose: Why Malwarebytes detects Potentially Unwanted Programs (PUPs)<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[13915,10560,10546,11279,20778,2130,16511],"class_list":["post-14415","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-enigma","tag-malwarebytes","tag-malwarebytes-news","tag-potentially-unwanted-programs","tag-pup-criteria","tag-pups","tag-spyhunter"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14415","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14415"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14415\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}