Scripts are written code that are interpreted and implemented by another application. Malware authors have taken advantage of relative ease of producing scripts and have produced significant numbers of script-based malware.
Severity rating refers to the impact to the host of the network traffic detected by a Trend Micro pattern called Network Content Inspection Pattern. It has the following levels:
High - Host exhibits behavior that definitely indicates host is comp
Symbian Installation System (SIS) files serve as installers for Symbian programs that run on mobile phones. Users run these installers to install the associated program on their mobile phone while it is connected to their computer.
Smishing refers to phishing attacks that involve the use of messages sent using the SMS (Short Message Service). False text messages are received by would-be victims, who in turn either reply directly or visit a phishing Web site.
A stealer is a Trojan that gathers information from a system. The most common form of stealers are those that gather logon information, like usernames and passwords, and then send the information to another system either via email or over a network.
System files, or SYS files in short, are files used either by a computer’s operating system or installed programs for various reasons. Some system files are small text files used to store settings; others are binary files that serve as drivers.