Trend Micro keeps your computer protected in real-time so you do not need to scan manually to remove malware and threats.
Ransomware
Ransomware prevents or limits users from accessing their computer. It forces its victims to pay the ransom through certain online payment methods in order to restore access to their systems, or to get their data back.
Users unwittingly download Ransomware through visiting malicious or compromised websites. It can also arrive as a payload, either dropped or downloaded by other malware. Some ransomware are delivered as attachments to spammed email.
Virus
A virus is a malicious program that infects files to spread and propagate. It has the capability to insert a copy of itself or any malicious code into another file which in turn destroys the file and makes it a replica of the virus. Viruses spread when the unaware user copies the infected file and executes them.
Worm
A worm is also a malicious program that creates a copy of itself and then sends it over the network to infect other systems. Worms can send their own copies using email, instant messaging applications, and Internet Relay Chat (IRC) without user intervention.
Trojan
Trojans are malicious programs that ride on third-party applications in the form of freeware and shareware. Once the third-party application is installed, trojans execute and release their payload which could be viruses, worms and other malware.
Spyware
A spyware monitors and gathers user information for different purposes depending on what it is intended to do. It intercepts and logs user computing activities and transmits the information to an unknown third party without notifying the user. Some third-party applications contain spyware that users unknowingly install when they accept the End User License Agreement (EULA).
Adware
Adware are applications that display advertising banners in Web browsers. They generate advertisements in the form of pop up windows or hotlinks on Web pages. Adware usually encourage users to download items from the Internet that may lead to malicious websites and viruses.
Rootkit
Rootkits are malware that has stealth mechanism. They are typically installed as drivers where they gain root system privileges and hook themselves to functions that virus scanners and system utilities use. This makes them invisible and undetected by system utilities that have lesser privileges.
Cookies
Cookies are text files that are created when users visit websites. They store information such as shopping cart contents, registration or login credentials, and user preferences. When a user returns to a website, a cookie provides information and allows the site to display in customized formats and to show targeted content such as advertising. Advertisers use cookies to track user activity across sites so they can better target ads.
Coin Miner
Coin Miner is a type of Trojan that can be embedded to a program or a website aiming to use your GPU and CPU power to generate tokens for the cryptocurrency wallet and the outcome causes PC slow down, freeze and may even crash at some point.