Definition

  • This extension is used by Microsoft Compiled HTML Help files. It is generally used to store the help files of applications, although alternate uses – such as for e-books - are possible.
    Read more
  • Click fraud is a type of internet crime that occurs in pay-per-click online advertising when a person, automated script, or computer program imitates a legitimate user of a web browser clicking on an ad to generate a charge per click.
    Read more
  • Clickjacking allows cybercriminals to hide malware and other threats under the content of legitimate sites. When visitors click on links on pages that have been clickjacked, they can unknowingly become victims of malware downloads.
    Read more
  • Cloud computing is a mechanism for providing IT-related functionality as a service, allowing users to access technology-enabled services from the Internet without needing the knowledge, expertise or control over supporting infrastructure.
    Read more
  • The Class ID, or CLSID, is a serial number that represents a unique ID for any application component in Windows.
    Read more
  • This phrase refers to the system configuration stored in a battery-powered memory chip known as the complementary metal-oxide semiconductor (CMOS). A computer uses these information for startup functions.
    Read more
  • As the name itself suggests, command-and-control (C&C) servers are used to remotely send often malicious commands to a botnet, or a compromised network of computers.
    Read more
  • The CME initiative is an effort headed by the United States Computer Emergency Readiness Team (US-CERT), in collaboration with key organizations within the security community to adopt a neutral, shared identification method.
    Read more
  • A Common Malware Enumeration (CME) number is a unique, vendor-neutral identifier for a particular threat (see CME Initiative and US-CERT).
    Read more
  • This term refers to a specific file in a software or computer system that is required for a specific function. Trend Micro antivirus products detect and remove components used by malware.
    Read more
  • The Control Pattern Release is a pre-release version of the Trend Micro threat protection database. It is a fully tested, manually downloadable scan pattern file, and serves as an emergency patch during a threat incident or event.
    Read more
  • Cookies are text files that are created when users visit websites. Cookies are used to tell the server that users have returned to a particular website and provides information used to show targeted content.
    Read more
  • Counter Antivirus (Counter AV) is a tool used by cybercriminals that is designed to evade anti-malware detection. This is done by appointing crypters or programs that can disguise malicious programs from security software.
    Read more
  • Cracking tools are software applications used by malicious users to break security measures implemented on target systems. Examples of this include password cracking software that would allow unauthorized access to other PCs.
    Read more
  • Crimeware is a general term for software used to perpetrate crime, such as stealing personal identities, money or proprietary information. Crimeware can spread by way of viruses, Trojan horse programs, worms, spyware, or adware.
    Read more
  • Cross-site Scripting (XSS) is a security vulnerability usually found in websites and/or web applications that accept user input such as search engines, login forms, message boards and comment boxes. Cybercriminals exploit this vulnerability by inputt
    Read more
  • A crypter is a software tool that can encrypt, obfuscate, and manipulate malware, making it undetectable to security programs. This is used by cybercriminals to create malware that can bypass security programs by presenting itself as a harmless progr
    Read more
  • Cybercriminals are hackers and other malicious users that use the Internet to commit crimes such as identity theft, spamming, phishing and other types of fraud. Cybercriminals often work together forming cyber gangs.
    Read more

Connect with us on