Better noticing of keyloggers.
Usually slips by..
The same problem as with most rogues. Those are the installers and as they won't do anything harmfull, nothing will be said ...
I am new to CIMA. Let's see if I understand how to detect a key-logger...
1. Submit the installer to CIMA.
2. If CIMA doesn't detect anything suspicious, install on my PC.
3. Submit all the installed executables to CIMA.
4. If CIMA doesn't detect anything suspicious, I then trust the installed executables.
There would be less risk to my PC, and the process would go faster, if CIMA provided the option to analyze the installed executables directly. The option could be offered after CIMA analyzes the installer.