• Damage Cleanup Services is the automated cleanup component of Trend Micro products. Trend Micro provides automated cleanup for all critical malware threats using the Damage Cleanup Engine, which is initiated upon malware detection.
  • A malware's damage potential rating may be high, medium, or low based on its inherent capacity to cause both direct and indirect damage to systems or networks.
  • A data breach is an incident wherein information is stolen or taken from a system without the knowledge or authorization of the system’s owner. A small company or a large organization may suffer a data breach. Stolen data may involve sensitive, propr
  • Data stealing malware is a web threat that divests victims of personal and proprietary information with the intent of monetizing stolen data through direct use or underground distribution.
  • Denial of service (DoS) is a type of cyber attack designed to disable, shut down or disrupt a network, website or service. Typically, a malware is used to interrupt or inhibit the normal flow of data into and out of a system to render the target usel
  • A threat tagged as destructive causes direct damage to files or computer systems so much so that antivirus solutions are unable to restore them to their original states.
  • Dialers are software that change modem configurations to dial high cost toll numbers or request payment for access to specific content.
  • Distributed denial of service [DDoS] is a type of cyber attack that entails having attackers utilize a large network of remote PCs, called botnets, to overwhelm another system’s connection or processor.
  • This phrase refers to the possible rate by which malware can spread to another system as defined by its speed or the complexity of its infection technique.
  • Dynamic Link Libraries (DLLs) provide a series of functions and routines to other applications and/or libraries that the latter do not have by themselves. This is frequently used in Windows.
  • These files are normally document files used, by default, by older versions of Microsoft Word and many other word processing applications. These files may be used to deliver malware to systems different ways.
  • Domains are unique titles assigned to websites' internet protocol (IP) addresses to make them easier to identify. It is made of the top-level domain (eg.: com, org, net, edu) and subdomains.
  • The Domain Name System (DNS) is the Internet standard for assigning IP addresses to domain names.
  • Droppers are programs designed to extract other files from their own code. Typically, these programs extract several files into the computer to install a malicious program package, but may have other functions apart from dropping files.