About_Security_Risks

About Security Risks

Security risk includes viruses, malware, spyware, and grayware. Trend Micro Security protects computers from security risks by scanning files and then performing a specific action for each security risk detected. An overwhelming number of security risks detected over a short period of time signals an outbreak, which Trend Micro Security can help contain by enforcing outbreak prevention policies and isolating infected computers until they are completely risk-free. Notifications and logs help you keep track of security risks and alert you if you need to take immediate action.

Viruses and Malware

Tens of thousands of virus/malware exist, with more being created each day. Computer viruses today can cause a great amount of damage by exploiting vulnerabilities in corporate networks, email systems and Web sites.

Trend Micro Security protects computers from the following virus/malware types:

Virus/Malware types

Virus/Malware Types

Description

Joke Program

A joke program is a virus-like program that often manipulates the appearance of things on a computer monitor.

Trojan Horse Program

A Trojan horse is an executable program that does not replicate but instead resides on computers to perform malicious acts, such as opening ports for hackers to enter. This program often uses Trojan Ports to gain access to computers. An application that claims to rid a computer of viruses when it actually introduces viruses to the computer is an example of a Trojan program. Traditional antivirus solutions can detect and remove viruses but not Trojans, especially those already running on the system.

Virus

A virus is a program that replicates. To do so, the virus needs to attach itself to other program files and execute whenever the host program executes.

  • Boot sector virus: A virus that infects the boot sector of a partition or a disk.

  • Java malicious code: Operating system-independent virus code written or embedded in Java™.

  • Macro virus: A virus encoded as an application macro and often included in a document.

  • VBScript, JavaScript, or HTML virus: A virus that resides on Web pages and downloads through a browser.

  • Worm: A self-contained program or set of programs able to spread functional copies of itself or its segments to other computers, often through email

Test Virus

A test virus is an inert file that is detectable by virus scanning software. Use test viruses, such as the EICAR test script, to verify that the antivirus installation scans properly.

Packer

Packers are compressed and/or encrypted Windows or Linux™ executable programs, often a Trojan horse program. Compressing executables makes packers more difficult for antivirus products to detect.

Probable Virus/Malware

Suspicious files that have some of the characteristics of virus/malware are categorized under this virus/malware type. For details about probable virus/malware, see the following page on the Trend Micro online Virus Encyclopedia:

http://www.trendmicro.com/vinfo/virusencyclo/default5.
asp?VName=POSSIBLE_VIRUS

Others

"Others" include viruses/malware not categorized under any of the virus/malware types.

Spyware and Grayware

Spyware and grayware refer to applications or files not classified as viruses or malware, but can still negatively affect the performance of the computers on the network. Spyware and grayware introduce significant security, confidentiality, and legal risks to an organization. Spyware/Grayware often performs a variety of undesired and threatening actions such as irritating users with pop-up windows, logging user keystrokes, and exposing computer vulnerabilities to attack.

Trend Micro Security protects computers from the following spyware/grayware types:

Spyware/Grayware types

Spyware/
Grayware Types

Description

Spyware

Spyware gathers data, such as account user names, passwords, credit card numbers, and other confidential information, and transmits it to third parties.

Adware

Adware displays advertisements and gathers data, such as Web surfing preferences, used for targeting future advertising at the user.

Dialer

A dialer changes client Internet settings and can force a computer to dial pre-configured phone numbers through a modem. These are often pay-per-call or international numbers that can result in a significant expense for an organization.

Hacking Tool

A hacking tool helps hackers enter a computer.

Remote Access Tool

A remote access tool helps hackers remotely access and control a computer.

Password Cracking Application

This type of application helps decipher account user names and passwords.

Others

"Others" include potentially malicious programs not categorized under any of the spyware/grayware types.

See also: