Threat Glossary

ADWARE

This is a type of software that displays ads on your computer or mobile device, but is different from malware or viruses because it isn’t always employed by hackers – there is a surplus of legitimate adware online. On the other hand, adware can be detrimental to your Internet security and privacy when cybercriminals use it to apply viruses, malware, spyware, or even ransomware in extreme cases.

Security products can safeguard your computer and devices from malicious adware through comprehensive web protection, resulting in a safer Internet environment for you and your family.


AGENTLESS ANTIVIRUS

Agentless antivirus protects all machines on the network or host without the need to deploy Internet security or antivirus protection to each of the machines. Compared to traditional antivirus software, the agentless variety demands less from the computing resources because it does not scan and protect the machines from a physical host – making it easier for a safer Internet.

This frees up the computer’s memory, storage, and CPU resources – allowing for a more efficient way to safeguard the device’s privacy and protect it from malware, spyware, ransomware, and other schemes hackers use.


BOTNET

Hackers build botnets by installing a virus or malware onto a computer – turning it into a “zombie computer”. Once this happens, the security hacker has full control of the computer and can use it to send spam and phishing messages, host malicious content, and attack other computers to add to the botnet.

Botnets are one of the larger sources of income for security hackers and one of the greater threats to Internet security and privacy. On the other hand, anti-malware software can protect you and your devices, allowing for a safer Internet.


CLOUD COMPUTING

Cloud computing uses a network of remote servers hosted online to store, manage, and process data rather than having it on a local server or computer. This allows companies to have numerous servers without the hassle of maintaining the servers themselves.

Cloud storage allows for a more convenient and efficient way for file storage and sharing, but, it also gives hackers another medium to attack. Malware, viruses, or ransomware aren’t commonplace in cloud storage but there still have been instances wherein sensitive information have been hacked and stolen.

Having a comprehensive Internet security protection allows the user a more private and safer online experience.


COMPUTER HACKERS

Computer hackers are people who seek and exploit vulnerabilities in computer systems or those without sufficient Internet security. They research and develop programs such as spyware, ransomware, and other malware that invade victims’ privacy and steal their private information – for a profit, more often than not.

It takes more than your regular antivirus to protect your devices since today’s hackers perform at a professional level, leading to a less safe Internet landscape.


DDOS ATTACKS

Distributed denial of service (DDoS) attacks are when multiple sources flood the bandwidth or resources of a targeted website or system. These attacks are usually brought on by botnets focused on flooding the targeted system.

DDoS attacks are different from regular services outages because these are done by hackers on purpose. If a computer is infected by a virus or malware then made part of a botnet, it is more than likely that it will be used as part of a DDoS attack.

Keeping your computers and mobile devices safe and protected from viruses, ransomware, and other malware is critical for your Internet security, privacy, and protection.


FAKEAV

Fake antivirus, or FakeAV, is a type of malware that is made to fool victims into thinking that it is a legitimate antivirus software. It warns you about your system being infected through photos or messages that try to convince you that your computer is infected.

A typical FakeAV will try to fool you into installing their antivirus software, and in extreme cases, they are actually ransomware that hackers use to invade your privacy and steal your data until you pay the ransom.

Having a complete Internet security suite protects you from FakeAV attacks by detecting the virus or malware and keeping it from running, while also helping you identify fraudulent software. By being familiar with your own security software, you can protect yourself and spot a fake one when it tries to infect you.


INTRUSION DETECTION SYSTEM

Intrusion detection systems (IDS) protect your networks from malicious intrusion by monitoring network activities, logging information, defending the network from malicious activity, and reporting it. IDS also identifies any issues connected to security policies and policy violations.

IDS can complement existing computer and Internet security software by adding another layer of defence against hackers who bypass initial defence systems with their malware, viruses, or ransomware.

Trend Micro’s OfficeScan protects your privacy and allows for a safe Internet environment with early and strong protection against imminent threats – whether on your network, mobile, or through remote access.


KEYSTROKE LOGGING

Hackers employ keystroke logging (or keyloggers) for their Internet fraud and theft schemes. When a virus is installed on your computer, a keylogger could also be secretly included. It mostly goes unnoticed but cybercriminals use this to steal your data when you do your online transactions.

On an infected computer, user logins and passwords are easily stolen as a victim unknowingly types in their information. The keylogging malware then stores this information in a database, to be used to steal from your account in the near future.

Keyloggers are one of the bigger threats to your Internet security and safety because of the ease it gives cybercriminals access to your private accounts. Because of the prevalence of keyloggers and other malicious software online, running comprehensive security software on all your devices is recommended to protect your devices and privacy.


MALWARE AND COMPUTER VIRUSES

Malware is a broader term that covers a list of malicious software that includes viruses, spyware, adware, and ransomware among others. While virus and malware are commonly used interchangeably, they are not exactly the same.

When choosing your Internet security software to protect yourself from hackers, it is important to know what specific malware it protects against. To ensure your privacy and a safer Internet environment, it is important to note the kinds of threats your software guards you against. A modern security package that offers comprehensive anti-malware and virus protection should be on top of your list.


PHISHING

Phishing is a type of cyberattack hackers carry out to steal your private and financial data. Compared to other viruses or malware, phishing differs in the technology it uses to fool you into giving your private information. It relies more on fooling people instead of technology, bypassing Internet security products.

Its schemes do not involve installing malware, instead relying on a massive spam attack – sending out thousands of spam messages posing as legitimate services or people they know. Hackers bait victims into giving up important information, posing as banks or other similar services. If a victim takes the bait, they get redirected to a spoof website where they log in with their information.

This is just another reason for consumers to run up-to-date anti-phishing and web reputation security software to protect themselves and have a safer Internet experience.


RANSOMWARE

Ransomware is part of the long list of malware types that attack unprotected systems but differs in its approach. It immediately lets an infected system’s owner know about the attack by taking the computer hostage until the ransom is paid to the hackers. It is one of the more successful types of attacks on Internet security and privacy since its effects are immediate and crippling to the victim.

Antivirus and anti-malware can help protect your data and devices by blocking ransomware attacks before they can even reach you – allowing for a safer Internet setting.


ROOTKIT HACKER TOOLS

A rootkit is a collection of tools hackers use to hide intrusions and access systems discreetly. A stealthy type of software, rootkits are often designed to maintain privileged access to computers. The term is often associated with malware, making “rootkit” have negative connotations.

Hackers can also use this access to modify existing Internet security software, antivirus software, and other setups that can be used to detect or circumvent it. Rootkits are sophisticated and evolve, making it harder to understand it; and in effect, making it also harder to remove from an infected system.

To protect yourself, your privacy, and have a better and safer Internet experience, programs like Trend Micro’s RootkitBuster can help in looking for those pesky rootkits and can clean and remove a wide and ever-growing number of rootkit variants.


SOCIAL ENGINEERING

Cybercriminals and hackers use social engineering as a way to get into your identity, your finances, and your private data. Social engineering can be harder to protect against compared to viruses or malware since they are target people rather than computer systems.

The act of tricking victims into giving out their private data is one of the more common ways social engineering endangers your Internet security. A fraudulent iPad giveaway asking for personal information, a fake app that supposedly monitors social media activities, and fake news sites that hosts FakeAV malware are just a few of the more recent examples of social engineering’s attacks on Internet safety.


SPYWARE

Spyware is a kind of software explicitly made to invade your privacy and collect information about your online activities; but unlike other viruses or malware, it does not try to infect other computers. Similar to adware, spyware has legitimate uses but is used maliciously by hackers most of the time.

It becomes an issue when spyware interferes with your online activity through pop-up advertisements, redirecting you to other sites, and possibly affecting your system’s performance. Most of the time, spyware are installed onto a computer after a successful malware or virus attack.

Internet security and antivirus companies closely monitor these spyware types to help protect their customers from it. Called anti-spyware, it is specifically made to battle software and is not usually part of traditional antivirus packages. To help protect yourself and have a safer internet experience, installing a full-featured Internet security program is your best bet.


TROJAN HORSE

After a successful virus attack by hackers, a Trojan horse (or Trojan) could be one of the types of malware you could find on your system. They are a sneakier type of malware because they pose as something beneficial to trick you into installing them.

Trojans could be categorized as social engineering attacks because they trick people instead of focusing on a computer’s vulnerabilities. Cybercriminals use them for online theft and fraud – attacking a user’s privacy and Internet security through the fraudulent program.

Antivirus programs can help protect your devices from Trojans, but you should rely on your protection alone. To fully have a safer Internet environment, make sure to only download and install verified programs from reputable Internet security companies.


VIRTUALISATION SECURITY

To secure server and computer systems, virtualization security (or virtual-aware security) is required. A virtual machine simulates desktop and server network resources to produce a virtual version wherein the framework is divided into multiple execution environments.

Virtual machines could also be affected by malware or viruses through unpatched security flaws, social engineering, or brute-force cyberattacks. The best way to protect your privacy and your system from hackers is to install a security platform that delivers comprehensive protection across all platforms: physical, virtual, and cloud.

Trend Micro Deep Security protects your applications and data from breaches and disruptions without the need for emergency patching. It is also the industry’s first agentless antivirus for virtual machine environments.


SECURITY VULNERABILITY EXPLOIT

In computer or Internet security parlance, a vulnerability is a weakness found in an application or operating system that can lead to malware or other computer virus attacks. Software vendors provide patches for their products to restore the security and privacy whenever vulnerabilities are detected.

With the prompt releases of patches and regular antivirus updates, you ought to be protected and safe from future hacking; however, with the lag time between the initial discovery of the vulnerability and the release of the patch, it could still lead to your computer’s exposure.

To combat this, installing a multi-layered comprehensive antivirus software is your best bet. Compared to just you free antivirus, this can better protect you from hackers, security exploits, and a broad range of computer threats.


WORMS

In computer jargon, worms are a type of malware that hackers designed to invade your privacy, infect your system with a virus, and try to infect as many other systems as possible. Computer experts coined the name “worm” because of how the virus crawls across networks and systems like how a crawling warm bores into an apple; but unlike real worms, computer worms tend to move quickly.

With the more sophisticated antivirus and security suites protecting us today, it is safe to say that we have a safer Internet environment. These antivirus packages, along with firewalls, are critical in protecting one’s self and data from being infected by worms.


ZERO-DAY EXPLOITS

Zero-day exploits are attacks that focus on previously unknown software vulnerabilities. Hackers usually discover these exploits before any of the software developers or researchers are aware of a patch to the virus or malware vulnerability.

To ensure your Internet security and privacy, install a comprehensive security software suite that makes use of the latest trends – especially those with huge databases of threat data. With the latest version of computer protection software, you are assured of being protected and of having a safe Internet experience.


ZOMBIE COMPUTERS

If a hacker successfully gets a virus or malware onto a device, there’s a chance he turns it into a “zombie computer” without you even knowing. Unbeknownst to the victim, the computer is used in an army of devices to spread malware, Trojans, phishing emails, ransomware, and more.

To battle this and make the Internet a safer place, antivirus and anti-malware software can help protect your devices and ensure your Internet security. These products can also alert you if your system has indeed been compromised with malware or similar programs hackers use.

Print Design

Nulla vitae libero, a pharetra augue. Integer posuere a ante venenatis condimentum. Donec id elit non mi porta gravida metus.

Motion Video

Vestibulum id ligula porta euismod semper. Aenean lacinia bibendum vestibulum. Cum sociis natoque penatibus et parturient.

Package Design

Aenean eu leo quam. Pellente ornare sem lacinia quam venenatis vestibulum sagittis montes, nascetur ridiculus mus.

Sound Engineering

Fusce dapibus commodo, tortor mauris condimentum nibh, ut fermentum massa. Maecenas sed diam eget risus varius.


A Little About Us

Pellentesque non diam et tortor dignissim bibendum. Neque sit amet mauris egestas posuere consectetur est. Slowave

Duis non lectus sit amet est imperdiet cursus elementum vitae eros. Cras quis odio in risus euismod suscipit. Fusce viverra ligula vel justo bibendum semper. Nulla facilisi. Donec interdum, enim in dignissim lacinia, lectus nisl viverra lorem, ac pulvinar nunc ante.

Elsewhere

Pellentesque consectetur lectus quis enim mollis ut convallis urna malesuada. Sed tincidunt interdum sapien vel gravida. Nulla a tellus lectus.