501 %PRODUCT% protection has been stopped. Your computer may now be vulnerable to viruses, spyware, and other malicious programs.
502 %PRODUCT% protection is now running. Your computer is now protected from viruses, spyware, and other malicious programs.
503 %PRODUCT% protection has been suspended. Your computer may now be vulnerable to viruses, spyware, and other malicious programs.
504 Unknown
505 or
506 Automatic Updates have been disabled. You may not be running the most recent version of %PRODUCT%. Use the %PRODUCT% control panel to enable automatic updates.
507 This program has an unusual autorun entry on a removable drive.
508 Your subscription to %PRODUCT% Pro will expire on %s. To ensure your PC stays fully protected, click here to renew now.
509 Your subscription to %PRODUCT% Pro will expire tomorrow. To ensure your PC stays fully protected, click here to renew now.
510 This program is changing the firewall exception list.
513 %PRODUCT% - Initiating
514 The program is attempting to load a device driver into the operating system
515 %PRODUCT% could not be started. Please try re-installing.
516 %PRODUCT% Status
517 %PRODUCT% Notice
518 %PRODUCT% Alert
519 %PRODUCT% Warning
520 %PRODUCT% has just prevented a trojan from infecting your system.
521 %PRODUCT% has just prevented a worm from infecting your system.
522 %PRODUCT% has just prevented spyware from infecting your system.
523 %PRODUCT% has detected that adware is attempting to run on your machine.
524 %PRODUCT% has just prevented a virus from infecting your system.
525 %PRODUCT% has just prevented a key logger from infecting your system.
526 %PRODUCT% has just prevented a rootkit from infecting your system.
527 An seemingly harmless program that in reality performs or allows an external agent to perform malicious and dangerous actions on your computer.
528 A program that can spread copies of itself to other computers using email or some other network transport mechanism.
529 A program that installs on, gathers information from and may take partial control of a computer without a user's informed consent.
530 Adware is software whose sole purpose is delivering ads on your computer. Often, it is bundled and integrated with additional software that provides other functionality.
531 A malicious program that can infect other files and rapidly replicate itself.
532 Key Logger
533 Rootkit
534 This trojan is also known as %s.
535 This worm is also known as %s.
536 This spyware is also known as %s.
537 This adware is also known as %s.
538 This virus is also known as %s.
539 This key logger is also known as %s.
540 This rootkit is also known as %s.
541 UNKNOWN
542 MODERATE
543 HIGH
544 VERY HIGH
545 UNKNOWN. The risk level of this type of malware is unknown at this time.
546 MODERATE. This action might represent a threat to your system security However, it is not uncommon for legitimate and trustworthy programs to perform this action as well.
547 HIGH. This action might represent a threat to your system security. Some legitimate and trustworthy programs perform this action, but it is not common.
548 VERY HIGH. This is a highly suspicious action which represents a threat to your system security. Most legitimate and trustworthy programs do not perform this action.
549 This attack typically appears in malware.
550 This attack typically appears in viruses, spyware, adware, worms and trojans.
551 This attack typically appears in adware and trojans.
552 This attack typically appears in adware.
553 This attack typically appears in spyware and adware.
554 This attack typically appears in viruses, spyware and adware.
555 This attack typically appears in trojans, viruses and some types of adware.
556 This attack typically appears in adware, trojans and worms.
557 This attack typically appears in worms, trojans and viruses.
558 This attack typically appears in trojans and worms.
559 This attack typically appears in trojans.
560 This attack typically appears in worms.
561 This attack typically appears in spyware, adware and trojans.
562 This attack typically appears in worms and buffer overflow exploits.
563 This attack typically appears in trojans, viruses and spyware.
564 This attack typically appears in trojans and rootkits.
565 This attack typically appears in rootkits.
566 This attack typically appears in viruses and trojans.
567 This attack typically appears in worms, trojans and spyware.
568 This program is behaving in a malware type manner.
569 This program is attempting to register itself in your "Windows System Startup" list. A program in this list will automatically load and operate every time you start up your computer.
570 This program is attempting to manipulate, modify or tamper with another program currently running on your computer.
571 This program is attempting to modify the way your computer communicates with the internet.
572 This program is attempting to launch another program hidden in the background, different from the initial program you clicked on.
573 This program is attempting to change your security settings, privacy levels or personal options on Internet Explorer.
574 This program is attempting to modify the way your computer communicates with the internet or monitor the information your computer is transmitting.
575 This program is attempting to copy itself to multiple locations on your computer.
576 This program is attempting to change your Internet Explorer Home Page.
577 This program is attempting to change your Search settings for Internet Explorer.
578 This program is attempting to change your security settings and privacy levels by modifying which websites are "trusted" by Internet Explorer.
579 This program is attempting to connect to the Internet in a suspicious manner to send out emails.
580 This program is attempting to connect to the Internet in a suspicious or unexpected manner.
581 This program is an "executable" file attempting to misrepresent itself as a ".PIF" file. This file will perform an action or set of actions on your computer if you permit it to proceed.
582 This program is attempting to copy an "executable" file to a sensitive area of your system. This file will perform an action or set of actions on your computer if the copy completes.
583 This program is attempting to alter the "user privileges" on your computer. This will change your ability to add/remove programs or otherwise manage your system.
584 This program is attempting to shut down your firewall, antivirus or anti-spyware protection.
585 This program is attempting to modify your computer so that another computer can access it.
586 This program is attempting to copy another program to an area of your computer that shares files with other computers.
587 This program is attempting to change the location from which you share files with other computers.
588 This program is attempting to change your security settings, privacy levels or personal options on Internet Explorer.
589 This program is attempting to modify your computer so that a file will run without your consent.
590 This program is attempting to remove an icon and its associated functionality from the Windows Control Panel.
591 This program is attempting to disable Windows File Protection.
592 This program is attempting to restrict your access to other programs.
593 This program is attempting to disable the Registry editing tools that manage your Windows and program settings.
594 This program is attempting to disable your Control-Alt-Delete function.
595 This program is attempting to disguise itself as a protected application.
596 This program is attempting to install a component that can monitor or manipulate your system activity.
597 This program is attempting to execute instructions from an unauthorized area of your computer.
598 This program is attempting to manipulate, modify or tamper with another program on your computer.
599 This program is attempting to hide a certain process from the Windows Task Manager.
600 This program is attempting to hide a certain file from your view.
601 This program is attempting to launch a web browser.
602 This program is unexpectedly attempting to send information off your system.
603 This program is logging keystrokes.
604 This program is attempting to access protected historical browsing information on your computer.
605 This program is attempting to take control of your web browser.
606 This program is attempting to take an unauthorized snapshot of your current active window.
607 This program is attempting to launch a malicious program.
608 This program is an "executable" file attempting to misrepresent itself as a ".CMD" file. This file will perform an action or set of actions on your computer if you permit it to proceed.
609 Your web browser is attempting to launch a program in an unusual way.
610 This application is also known as %s.
611 Reboot Required
612 The last scheduled scan detected one or more threats and your immediate attention is required. Please click here to launch %PRODUCT% and run a full scan.
613 An executable program is being created in an alternate data stream.
614 %PRODUCT% has detected a potentially unwanted application.
616 The latest %PRODUCT% update has been successfully installed. Click here to learn more about this update.
617 Automatic update completed
618 Automatic update requires reboot
619 The latest %PRODUCT% update has been successfully installed, but a reboot is necessary to complete the process. Please reboot your computer now. Click here to learn more about this update.
620 %PRODUCT% has detected that a reboot is required in order to update certain program drivers. Please reboot your machine now to ensure you are fully protected.
621 Potentially unwanted applications (PUAs) are programs like adware that may exhibit some malware characteristics. They are often bundled or integrated with other software with desirable functionality. PUAs may also be system tools that have possible malicious uses or that have been observed in malware bundles.