• CHM (Microsoft Compiled HTML Help) is the extension used by Windows help files and other files such as e-books. Cybercriminals have been known to abuse vulnerabilities in CHM files to execute arbitrary code. Successful exploitation requires the user
  • Click fraud is a type of internet crime that occurs in pay-per-click online advertising when a person, automated script, or computer program imitates a legitimate user of a web browser clicking on an ad to generate a charge per click.
  • Click fraud is a type of cybercriminal technique where malicious actors use an automated script or computer program to imitate a legitimate user's clicks. This is done to generate fraudulent charges on ads in pay-per-click advertising platforms.
  • Clickjacking allows cybercriminals to hide malware and other threats under the content of legitimate sites. When visitors click on links on pages that have been clickjacked, they can unknowingly become victims of malware downloads.
  • Cloud computing refers to the process of using Internet-hosted servers, virtual machines, or software as a service, allowing users to access services without needing the knowledge, expertise, or control over the infrastructure that supports them. Bus
  • The Class ID, or CLSID, is a serial number that represents a unique ID for any application component in Windows.
  • This phrase refers to the system configuration stored in a battery-powered memory chip known as the complementary metal-oxide semiconductor (CMOS). A computer uses these information for startup functions.
  • A command-and-control [C&C] server is a machine controlled by an attacker or cybercriminal which is used to send commands to systems compromised by a malware and to receive stolen data from a target network.
  • As the name itself suggests, command-and-control (C&C) servers are used to remotely send often malicious commands to a botnet, or a compromised network of computers.
  • The CME initiative is an effort headed by the United States Computer Emergency Readiness Team (US-CERT), in collaboration with key organizations within the security community to adopt a neutral, shared identification method.
  • A Common Malware Enumeration (CME) number is a unique, vendor-neutral identifier for a particular threat (see CME Initiative and US-CERT).
  • This term refers to a specific file in a software or computer system that is required for a specific function. Trend Micro antivirus products detect and remove components used by malware.
  • The Control Pattern Release is a pre-release version of the Trend Micro threat protection database. It is a fully tested, manually downloadable scan pattern file, and serves as an emergency patch during a threat incident or event.
  • The Control Pattern Release (CPR) is a manually loadable, pre-release version of the Trend Micro threat protection database, designed to provide users with antimalware protection in between official pattern file releases. It is a fully tested pattern
  • A cookie is a piece of data from a website that is stored within a web browser that the website can retrieve at a later time. Cookies are used to tell the server that users have returned to a particular website. When users return to a website, a cook
  • Counter Antivirus (Counter AV) is a tool used by cybercriminals that is designed to evade anti-malware detection. This is done by appointing crypters or programs that can disguise malicious programs from security software.
  • Cracking tools are software applications used to break security measures implemented on systems and applications.
  • Crimeware is a general term for software used to perpetrate crime, such as stealing personal identities, money or proprietary information. Crimeware can spread by way of viruses, Trojan horse programs, worms, spyware, or adware.
  • Cross-site Scripting (XSS) is a security vulnerability usually found in websites and/or web applications that accept user input such as search engines, login forms, message boards and comment boxes. Cybercriminals exploit this vulnerability by inputt
  • A crypter is software that can encrypt, obfuscate, and manipulate malware, making it undetectable to security programs. It is used by cybercriminals to create malware that can bypass security programs by presenting itself as a harmless program until
  • A cryptocurrency is an encrypted data string that denotes a unit of currency. It is monitored and organized by a peer-to-peer network called a blockchain, which also serves as a secure ledger of transactions,
  • Cybercriminals are individuals or teams of people who use technology to commit malicious activities on digital systems or networks with the intention of stealing sensitive company information or personal data, and generating profit. Cybercriminals