We recommend using our Submit File upload form to perform a deep scan of the contents to ensure malware is not hiding in files you think are suspicious. However, we also provide a variety of other tools and utilities (links below) to help you validate suspicious files, emails and domains that you encounter on the internet. These are more advanced resources but are provided with a simple interface.
Follow us on Twitter and monitor our blog to become more aware of emerging malware threats and evolving techniques to detect and stop them from spreading. We are actively developing new tools and detection algorithms to help you guard against these exploitation threats.