Skip to content
1-888-762-8736(M-F 8:00am-5:00pm CST)
1-877-218-7353(M-F 8:00am-5:00pm CST)
href="http://www.trendmicro.com/us/enterprise/index.html" id="ENT-overview-test2" title="SEE ALL ENTERPRISE SOLUTIONS">Enterprise Overview
Welcome to the new Trend Micro Threat Encyclopedia! This site is your source for the latest information on computer threats and security. It focuses on Trend Micro products’ detections of threats that may be in the wild and may affect any number of computers.
Computer threats vary in behavior and purpose. The Threat Encyclopedia will help you understand these threats’ complexity and intentions and thus help you protect your computers by removing these threats should the need arise.
To gain full use of the information found in the Threat Encyclopedia, this page particularly walks you through its contents and how to find your way to get to the information that will be most useful to you. If you have visited the old Threat Encyclopedia before, you may notice some differences between its contents and features and those of this new site. As you go through this tutorial, you will find out and discover what these differences are.
In this article, you will find the answers to the following questions:
Malware no longer work the way they used to in order to achieve their creators’ purposes. Most malware nowadays are more advanced in that they either (a) use two or more technologies or (b) are able to attack systems using a number of avenues. Furthermore, such malware can easily sneak past computer security protocols. These types of malware are called blended threats.
A blended threat may arrive on a system in a number of ways—(a) as an email attachment sent by another malware, (b) as a file downloaded from file-sharing sites, or (c) as a file downloaded from a link endorsed by a supposedly trusted site. Indeed, with the boom of Web 2.0, malware have become more insidious and widespread. To better educate you about computer threats, we presented the information you need to know graphically in a single frame.
As the sophistication of malware increases, the more you should be aware of how they work in order to stop the chain of infection. Presenting information in the simplest form possible can definitely make you as aware you should be.
The pages in the new Threat Encyclopedia can be classified into three types, namely:
Malware-related attacks have evolved into so-called blended threats. They are no longer restricted to file and local network transfer. Blended threats exploit a combination of application vulnerabilities and send out spammed messages containing links to malicious URLs or malicious file attachments just to spread their malicious code.
In line with changes in the current threat landscape, the new Threat Encyclopedia has also evolved to present the complete story behind blended threats. Its contents not only present information about the various Web technologies cybercriminals are exploiting. The articles are linked with one another to illustrate the relationships and interconnections among exploited technologies. It highlights high-profile Web attacks and summarizes all related information to present a complete picture.
Malware articles: These describe malware detections in detail and provide Trend Micro’s solutions and recommendations.
Spam articles: These provide information on individual spammed messages Trend Micro security experts protect product users from.
Malicious URLs articles: These contain information on all the malicious URLs Trend Micro security experts have identified and consequently blocked.
Vulnerabilities articles: These provide details on specific software vulnerabilities.
Web attacks articles: These present the relationships among the various threat vectors and types used in Web attacks to create the big picture.
Note how the image in Figure 1 also serves as a landing page Global Navigator. This reflects the site’s content structure, which features four article types representing the individual technologies (i.e., the four low-level articles) and highlights the Web attacks article.
Connect with us on
| | | |