So I use IObit Driver Booster. And in fact, I recommend it as a driver updater that will at least give you the correct drivers.
But IObit is, and as long as I've used them.... they are scummy.
There is a reason that they are designated as a PUP (PUA) by some vendors.
So I go to Driver Booster tonight.
And I get this very serious warning --
"There are 4 remote code execution vulnerabilities existed (SIC) in Remote Desktop Services"
Well.... that sounds pretty serious.
But, having experienced the scummy & scuzzy practices of IObit for a while, I'm always a little skeptical of what they say.
On this warning, I'm thinking...... hmmmmm, why wouldn't Windows Update take care of this vulnerability? And... what does this have to do with drivers? The only IObit software I have is the driver updater.
Then when I click and go to the webpage for more information, there are more distortions and misrepresentations and scare tactics.
All this is.... it's scare tactics (FUD) to try and trick you into downloading so-called "IObit Advanced SystemCare."
If Advanced SystemCare is a good product, why do they have to try and scare and trick people into downloading it?
And then when I tell IObit that I'm not interested in their stupid download, I get even more FUD (fear, uncertainty, doubt).
Wow, if I don't download Advanced SystemCare, my system is LIKELY to be exploited by hackers...
For absolute clarity, there are no updates I need. I'm current.
And it has nothing to do with drivers.
IObit just sorta sucks.
ESET Detects it:
There are reasons that IObit products are detected by multiple vendors.
Use caution with slimy scummy IObit.
For the MT crowd here, it's easy to see through these deceptive practices and FUD. For the average user.... not good.