Application Security Risk Levels Parent topic

Trend Micro scans every application that is uploaded for security risk and identifies a risk level for every application.

Virtual Mobile Infrastructure Components

Component Description Required or Optional
Malicious
icon_risk_malicious-2.png
Malicious applications can collect users' personal and private data such as pictures, contacts, videos and audio recordings.
Notable
icon_risk_high-2.png
Notable applications can access user's email address, location information, media files and Web browser bookmarks. Applications that can change the Web browser's home page, add icons on home screen or show irremovable advertisements are also Notable applications.
PUA
icon_risk_high-2.png
Potentially unwanted applications (PUA) may pose high risk or have untoward impact on your security and/or privacy.
Clean
icon_risk_safe-2.png
These are the applications that are safe to use.
Unknown
icon_risk_unknown-2.png
Trend Micro has not yet scanned these applications. Virtual Mobile Infrastructure checks Trend Micro's database, once a day, for the risk level of every uploaded application, and displays the latest risk level.