Search
Keyword: url
            300 Total Search   |   
                        Showing Results : 1 - 20
                    
                    
                This is the Trend Micro detection for URLs with low reputation. This detection is based on heuristic rules and analysis. This indicates that there is a potential risk in your computer's network.
 This file contains a URL where it connects to possibly download other files.
 This Trojan is downloaded from specific remote sites. It connects to a possibly malicious URL.
 This detection is for web threats related to malicious URL redirectors. It is common for web threats to redirect URLs to avoid detection. An example is using meta refresh and HTTP status codes of 3XX. Other examples are using scripts like Javascript,...
 This is the Trend Micro detection for phishing emails that pretend to be sent from a known or popular brand. The phishing email attempts to lure recipients to click the URL in the content or open the email attachment. Usually, clicking the URL redire...
 This Trojan  may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
 This Trojan  may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
 This Trojan  may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
 This Trojan  may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
 This Trojan  may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
 This Trojan  may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
 This Trojan Spy  downloads a file from a certain URL then renames it before storing it in the affected system. It retrieves specific information from the affected system. It connects to certain websites to send and receive information.
 This Trojan  may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
 This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it before storing it in the affected system.
 This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it before storing it in the affected system.
 This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it before storing it in the affected system.
 This Trojan  arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It downloads a file from a certain URL then renames it before storing it in the affected system.
 This Trojan  may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL. However, as of this writing, the said sites ar...
 This Trojan  may be hosted on a website and run when a user accesses the said website. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL. However, as of this writing, the said sites ar...
 This is the Trend Micro detection for PDF files which shows fake messages when opened. It requires user to click the image in the PDF file. Once clicked, it accesses a URL. This Trojan  arrives as an attachment to email messages spammed by other malw...
 