ThreatInfo policy
Privacy Policy
How ThreatInfo handles search activity, technical logs, analytics, downloads, and security telemetry.
Information we process
ThreatInfo is primarily a public malware intelligence website. When you use it, the service may process technical request data such as IP address, user agent, referring page, requested URL, timestamps, error logs, and download events. Search queries and visited report pages may be processed to provide the service and protect it from abuse.
Analytics and cookies
ThreatInfo uses analytics and tag scripts to understand traffic, page performance, search visibility, and usage patterns. These tools may set cookies or use similar identifiers. Browser settings and privacy tools can limit or block some analytics behavior.
How information is used
Technical and usage data helps operate ThreatInfo, diagnose errors, prevent abuse, measure search performance, improve report pages, and maintain download reliability. Security logs may be retained when needed to investigate attacks, crawling problems, or service misuse.
Third-party services
ThreatInfo may link to GridinSoft services, use Google analytics/tag infrastructure, and provide a GridinSoft Anti-Malware installer. Those services may process data according to their own policies when you interact with them.
Your choices
You can avoid submitting personal information through ThreatInfo search, disable cookies in your browser, use privacy controls for analytics, and choose whether to download or install security software. Requests about privacy or data handling can be directed through GridinSoft support channels.