• Safe mode is a software or operating system mode where most fixes are done. It is a diagnostic mode. Some malware require removal in this mode.
  • The scan engine, found in Trend Micro content security products, is a core program that works with the latest pattern file to protect users against all known threats.
  • Scripts are written code that are interpreted and implemented by another application. Malware authors have taken advantage of relative ease of producing scripts and have produced significant numbers of script-based malware.
  • Search engine optimization (SEO) is the process of improving the volume and quality of traffic to a web site from search engines via "natural" ("organic" or "algorithmic") search results.
  • Symbian Installation System (SIS) files serve as installers for Symbian programs that run on mobile phones. Users run these installers to install the associated program on their mobile phone while it is connected to their computer.
  • SMiShing refers to phishing attacks that involve the use of messages sent using the SMS (Short Message Service). False text messages are received by would-be victims, who in turn either reply directly or visit a phishing Web site.
  • SMS is a feature in all modern mobile phone networks that allows users to send short text messages of limited length to other mobile phone users.
  • The art of deception employed by online crooks to get their hands on your money is what the term social engineering generally refers to.
  • Social networking sites are sites that allow users to build online communities, usually revolving around common interests and/or activities.
  • Spam is unwanted and unsolicited bulk email. Over 95% of all email today is spam.
  • Spear phishing is a targeted form of phishing in which fraudulent emails target specific organizations in an effort to gain access to confidential information.
  • Spyware is a program that monitors and gathers personal information and sends to a third party without the user’s knowledge or consent.
  • SQL injections are one of the most common code injection techniques used by attackers to attack websites. An attacker finds a vulnerability in the target website SQL-based application software.
  • A stealer is a Trojan that gathers information from a system. The most common form of stealers are those that gather logon information, like usernames and passwords, and then send the information to another system either via email or over a network.
  • These malware types are designed to run specifically on mobile phones than run various versions of the Symbian operating system. They are not capable of running on normal Windows systems.
  • Trend System Cleaner (SysClean) package is a stand alone tool that incorporates the Trend Micro VSAPI Malware and Spyware scanning engines, and Trend Micro Damage Cleanup Engine and Template
  • A system file is a critical file that is part of an operating system or a device driver. When system files are corrupted by malware, users must know how to re-install or restore system files.
  • On Windows operating systems, System Restore is a feature that restores your computer to a point where it is working fine. System Restore uses the last restore point made as its reference.