Different Threats detected by Trend Micro Security
- Solution ID:1104637
- Last Updated:Sep. 26, 2018 5:17 AM (PST)
- Applies to:Antivirus+ Security - 2016;2017;2018;2019;Internet Security - 2016;Internet Security - 2017;Internet Security - 2018;Internet Security - 2019;Maximum Security - 2016;Maximum Security - 2017;Maximum Security - 2018;Maximum Security - 2019;Premium Security - 2016;Premium Security - 2017;Premium Security - 2018;Premium Security - 2019;
- Threats Trend Micro Detects | Trend Micro Security
This article contains information about different types of threats that your computer is being protected from by Trend Micro Security.
To know about the different types of threats, click on the threats below:
Ransomware prevents or limits users from accessing their system. It forces its victims to pay the ransom through certain online payment methods in order to restore access to their systems, or to get their data back.
Ransomware can be downloaded by unwitting users who visit malicious or compromised websites. It can also arrive as a payload, either dropped or downloaded by other malware. Some ransomware are delivered as attachments to spammed email.
For more information about Ransomware, refer to this Knowledge Base article: Ransomware: Introduction, Prevention and Trend Micro Security Solutions.
A virus is a malicious program that infects files to spread and propagate. It has the capability to insert a copy of itself or any malicious code into another file which in turn destroys the file and makes it a replica of the virus. Viruses spread when the unaware user copies the infected file and executes them.
A worm is also a malicious program that creates a copy of itself and then sends it over the network to infect other systems. Worms can send their own copies using email, instant messaging applications, and Internet Relay Chat (IRC) without user intervention.
Trojans are malicious programs that ride on third-party applications in the form of freeware and shareware. Once the third-party application is installed, trojans execute and release their payload which could be viruses, worms and other malware.
Spyware is a program that monitors and gathers user information for different purposes depending on what it is intended to do. It intercepts and logs user computing activities and transmits the information to an unknown third party without notifying the user. Some third-party applications contain spyware that users unknowingly install when they accept the End User License Agreement (EULA).
Adware are applications that display advertising banners in Web browsers. They generate advertisements in the form of pop-up windows or hotlinks on Web pages. Adware usually encourage users to download items from the Internet that may lead to malicious websites and viruses.
Rootkits are malware that has stealth mechanism. They are typically installed as drivers where they gain root system privileges and hook themselves to functions that virus scanners and system utilities use. This makes them invisible and undetected by system utilities that have lesser privileges.
Coin Miner is a type of Trojan that can be embedded to a program or a website aiming to use your GPU and CPU power to generate tokens for the cryptocurrency wallet and the outcome causes PC slow down, freeze and may even crash at some point.
If your Trend Micro Security has detections that you want know more about, visit our Threat Encyclopedia for more information.