Definition

  • Damage Cleanup Services is the automated cleanup component of Trend Micro products. Trend Micro provides automated cleanup for all critical malware threats using the Damage Cleanup Engine, which is initiated upon malware detection.
    Read more
  • A malware's damage potential rating may be high, medium, or low based on its inherent capacity to cause both direct and indirect damage to systems or networks.
    Read more
  • A data breach is an incident where information, typically data that is sensitive, proprietary or confidential in nature, is stolen or taken from a system without the knowledge or authorization of the system’s owner.
    Read more
  • Data stealing malware is a web threat that divests victims of personal and proprietary information with the intent of monetizing stolen data through direct use or underground distribution.
    Read more
  • Denial of service (DoS) is an attack designed to disable, shut down or disrupt a network, website or service.
    Read more
  • A threat tagged as destructive causes direct damage to files or computer systems so much so that antivirus solutions are unable to restore them to their original states.
    Read more
  • Dialers are software that change modem configurations to dial high cost toll numbers or request payment for access to specific content.
    Read more
  • A distributed denial of service (DDoS) is a form of DoS attack in which the attack is launched from different locations in coordinated fashion.
    Read more
  • This phrase refers to the possible rate by which malware can spread to another system as defined by its speed or the complexity of its infection technique.
    Read more
  • Dynamic Link Libraries (DLLs) provide a series of functions and routines to other applications and/or libraries that the latter do not have by themselves. This is frequently used in Windows.
    Read more
  • These files are normally document files used, by default, by older versions of Microsoft Word and many other word processing applications. These files may be used to deliver malware to systems different ways.
    Read more
  • Domains are unique titles assigned to websites' internet protocol (IP) addresses to make them easier to identify. It is made of the top-level domain (eg.: com, org, net, edu) and subdomains.
    Read more
  • The Domain Name System (DNS) is the Internet standard for assigning IP addresses to domain names.
    Read more
  • Droppers are programs designed to extract other files from their own code. Typically, these programs extract several files into the computer to install a malicious program package, but may have other functions apart from dropping files.
    Read more

Connect with us on