It's good to be cautious, but as the poster above me says, it's also extremely useful to pay attention to the codes each vendor uses. (It's also worth looking up the services that flagged the file, and seeing if they're actually reliable, in general.)