Definition

  • Safe mode is a software or operating system mode where most fixes are done. It is a diagnostic mode. Some malware require removal in this mode.
    Read more
  • See Hoax
    Read more
  • The scan engine, found in Trend Micro content security products, is a core program that works with the latest pattern file to protect users against all known threats.
    Read more
  • Scripts are written code that are interpreted and implemented by another application. Malware authors have taken advantage of relative ease of producing scripts and have produced significant numbers of script-based malware.
    Read more
  • Search engine optimization (SEO) is the process of improving the volume and quality of traffic to a web site from search engines via "natural" ("organic" or "algorithmic") search results.
    Read more
  • Symbian Installation System (SIS) files serve as installers for Symbian programs that run on mobile phones. Users run these installers to install the associated program on their mobile phone while it is connected to their computer.
    Read more
  • SMiShing refers to phishing attacks that involve the use of messages sent using the SMS (Short Message Service). False text messages are received by would-be victims, who in turn either reply directly or visit a phishing Web site.
    Read more
  • SMS is a feature in all modern mobile phone networks that allows users to send short text messages of limited length to other mobile phone users.
    Read more
  • The art of deception employed by online crooks to get their hands on your money is what the term social engineering generally refers to.
    Read more
  • Social networking sites are sites that allow users to build online communities, usually revolving around common interests and/or activities.
    Read more
  • Spam is unwanted and unsolicited bulk email. Over 95% of all email today is spam.
    Read more
  • Spear phishing is a targeted form of phishing in which fraudulent emails target specific organizations in an effort to gain access to confidential information.
    Read more
  • Spyware is a program that monitors and gathers personal information and sends to a third party without the user’s knowledge or consent.
    Read more
  • SQL injections are one of the most common code injection techniques used by attackers to attack websites. An attacker finds a vulnerability in the target website SQL-based application software.
    Read more
  • A stealer is a Trojan that gathers information from a system. The most common form of stealers are those that gather logon information, like usernames and passwords, and then send the information to another system either via email or over a network.
    Read more
  • These malware types are designed to run specifically on mobile phones than run various versions of the Symbian operating system. They are not capable of running on normal Windows systems.
    Read more
  • Trend System Cleaner (SysClean) package is a stand alone tool that incorporates the Trend Micro VSAPI Malware and Spyware scanning engines, and Trend Micro Damage Cleanup Engine and Template
    Read more
  • A system file is a critical file that is part of an operating system or a device driver. When system files are corrupted by malware, users must know how to re-install or restore system files.
    Read more
  • On Windows operating systems, System Restore is a feature that restores your computer to a point where it is working fine. System Restore uses the last restore point made as its reference.
    Read more

Connect with us on