Get it on Google Play
New! Download Unionpedia on your Android™ device!
Faster access than browser!


Index Malware

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network. [1]

125 relations: Adware, Affiliate marketing, Air gap (networking), Air gap malware, Ancient Greek, Antivirus software, Apple II, Authentication, Backdoor (computing), Berkeley Software Distribution, Boot sector, Booting, Botnet, Broadband, Browser exploit, Browser hijacking, Buffer overflow, CD-ROM, Child pornography, Click fraud, Cmd.exe, Common Vulnerabilities and Exposures, Compact disc, Comparison of antivirus software, Computability theory, Computer, Computer network, Computer security, Computer virus, Computer worm, CryptoLocker, Cyber spying, Cyberattack, Denial-of-service attack, Directory service, Drive-by download, Email attachment, Email spam, Encryption, ESET, Executable, Extortion, Facebook malware, File binder, Fingerprint (computing), Firewall (computing), Floppy disk, Fred Cohen, HTML email, IBM Personal Computer, ..., Identity theft, Industrial espionage, Internet, Jargon File, JavaScript, John von Neumann, Kernel (operating system), Linux malware, Machine code, Macintosh, MacOS, Macro (computer science), Macro virus, Malicious Software Removal Tool, Malvertising, Malwarebytes, Master boot record, Microsoft Safety Scanner, Microsoft Security Essentials, Microsoft Windows, Microsoft Word, Morris worm, MS-DOS, National Vulnerability Database, NSA ANT catalog, Operating system, Patch Tuesday, Phishing, Plug-in (computing), Portable Executable, Portmanteau, Potentially unwanted program, Privilege (computing), Process (computing), Ransomware, Remote desktop software, Removable media, Riskware, Rootkit, Safe mode, Scareware, Scripting language, Security bug, Security hacker, Server (computing), Shamoon, Single sign-on, Social engineering (security), Software bug, Sony, Sony BMG copy protection rootkit scandal, Spyware, Stegomalware, Stuxnet, SunOS, Superuser, System administrator, System File Checker, System Restore, Targeted threat, Task manager, Threat (computer), Trojan Horse, Trojan horse (computing), Troy, Typosquatting, United States Computer Emergency Readiness Team, Universal Time-Sharing System, Unix, VAX, Vulnerability (computing), Windows Defender, Windows Update, Yahoo!, Zombie (computer science). Expand index (75 more) »


Adware, or advertising-supported software, is software that generates revenue for its developer by automatically generating online advertisements in the user interface of the software or on a screen presented to the user during the installation process.

New!!: Malware and Adware · See more »

Affiliate marketing

Affiliate marketing is a type of performance-based marketing in which a business rewards one or more affiliates for each visitor or customer brought by the affiliate's own marketing efforts.

New!!: Malware and Affiliate marketing · See more »

Air gap (networking)

An air gap, air wall or air gapping is a network security measure employed on one or more computers to ensure that a secure computer network is physically isolated from unsecured networks, such as the public Internet or an unsecured local area network.

New!!: Malware and Air gap (networking) · See more »

Air gap malware

Air gap malware is malware that is designed to defeat the air-gap isolation of secure computer systems using various.

New!!: Malware and Air gap malware · See more »

Ancient Greek

The Ancient Greek language includes the forms of Greek used in ancient Greece and the ancient world from around the 9th century BC to the 6th century AD.

New!!: Malware and Ancient Greek · See more »

Antivirus software

Antivirus software, or anti-virus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

New!!: Malware and Antivirus software · See more »

Apple II

The Apple II (stylized as Apple.

New!!: Malware and Apple II · See more »


Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

New!!: Malware and Authentication · See more »

Backdoor (computing)

A backdoor is a method, often secret, of bypassing normal authentication or encryption in a computer system, a product, or an embedded device (e.g. a home router), or its embodiment, e.g. as part of a cryptosystem, an algorithm, a chipset, or a "homunculus computer" (such as that as found in Intel's AMT technology).

New!!: Malware and Backdoor (computing) · See more »

Berkeley Software Distribution

Berkeley Software Distribution (BSD) was a Unix operating system derivative developed and distributed by the Computer Systems Research Group (CSRG) of the University of California, Berkeley, from 1977 to 1995.

New!!: Malware and Berkeley Software Distribution · See more »

Boot sector

A boot sector is a region of a hard disk, floppy disk, optical disc, or other data storage device that contains machine code to be loaded into random-access memory (RAM) by a computer system's built-in firmware.

New!!: Malware and Boot sector · See more »


In computing, booting is starting up a computer or computer appliance until it can be used.

New!!: Malware and Booting · See more »


A botnet is a number of Internet-connected devices, each of which is running one or more bots.

New!!: Malware and Botnet · See more »


In telecommunications, broadband is wide bandwidth data transmission which transports multiple signals and traffic types.

New!!: Malware and Broadband · See more »

Browser exploit

A browser exploit is a form of malicious code that takes advantage of a flaw or vulnerability in an operating system or piece of software with the intent to breach browser security to alter a user's browser settings without their knowledge.

New!!: Malware and Browser exploit · See more »

Browser hijacking

Browser hijacking is a form of unwanted software that modifies a web browser's settings without a user's permission, to inject unwanted advertising into the user's browser.

New!!: Malware and Browser hijacking · See more »

Buffer overflow

In information security and programming, a buffer overflow, or buffer overrun, is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations.

New!!: Malware and Buffer overflow · See more »


A CD-ROM is a pre-pressed optical compact disc which contains data.

New!!: Malware and CD-ROM · See more »

Child pornography

Child pornography is pornography that exploits children for sexual stimulation.

New!!: Malware and Child pornography · See more »

Click fraud

Click fraud is a type of fraud that occurs on the Internet in pay-per-click (PPC) online advertising.

New!!: Malware and Click fraud · See more »


Command Prompt, also known as cmd.exe or cmd (after its executable file name), is the command-line interpreter on Windows NT, Windows CE, OS/2 and eComStation operating systems.

New!!: Malware and Cmd.exe · See more »

Common Vulnerabilities and Exposures

The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures.

New!!: Malware and Common Vulnerabilities and Exposures · See more »

Compact disc

Compact disc (CD) is a digital optical disc data storage format that was co-developed by Philips and Sony and released in 1982.

New!!: Malware and Compact disc · See more »

Comparison of antivirus software

This is a non-exhaustive list of notable antivirus and Internet Security software, in the form of comparison tables, according to their platform (e.g. desktop, mobile, server, etc.) and their operating systems (e.g. Windows, OS X, Linux, Solaris, Android, iOS, Ubuntu Touch, Windows Phone, etc.).

New!!: Malware and Comparison of antivirus software · See more »

Computability theory

Computability theory, also known as recursion theory, is a branch of mathematical logic, of computer science, and of the theory of computation that originated in the 1930s with the study of computable functions and Turing degrees.

New!!: Malware and Computability theory · See more »


A computer is a device that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming.

New!!: Malware and Computer · See more »

Computer network

A computer network, or data network, is a digital telecommunications network which allows nodes to share resources.

New!!: Malware and Computer network · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Malware and Computer security · See more »

Computer virus

A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.

New!!: Malware and Computer virus · See more »

Computer worm

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.

New!!: Malware and Computer worm · See more »


The CryptoLocker ransomware attack was a cyberattack using the CryptoLocker ransomware that occurred from 5 September 2013 to late May 2014.

New!!: Malware and CryptoLocker · See more »

Cyber spying

Cyber spying, or cyber espionage, is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using methods on the Internet, networks or individual computers through the use of proxy servers, cracking techniques and malicious software including Trojan horses and spyware.

New!!: Malware and Cyber spying · See more »


A cyberattack is any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices.

New!!: Malware and Cyberattack · See more »

Denial-of-service attack

In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

New!!: Malware and Denial-of-service attack · See more »

Directory service

In computing, directory service or name service maps the names of network resources to their respective network addresses.

New!!: Malware and Directory service · See more »

Drive-by download

Drive-by download means two things, each concerning the unintended download of computer software from the Internet.

New!!: Malware and Drive-by download · See more »

Email attachment

An email attachment is a computer file sent along with an email message.

New!!: Malware and Email attachment · See more »

Email spam

Email spam, also known as junk email, is a type of electronic spam where unsolicited messages are sent by email.

New!!: Malware and Email spam · See more »


In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

New!!: Malware and Encryption · See more »


ESET is an IT security company that offers anti-virus and firewall products such as ESET NOD32.

New!!: Malware and ESET · See more »


In computing, executable code or an executable file or executable program, sometimes simply referred to as an executable or binary, causes a computer "to perform indicated tasks according to encoded instructions," as opposed to a data file that must be parsed by a program to be meaningful.

New!!: Malware and Executable · See more »


Extortion (also called shakedown, outwrestling and exaction) is a criminal offense of obtaining money, property, or services from an individual or institution, through coercion.

New!!: Malware and Extortion · See more »

Facebook malware

The social media platform and social networking service Facebook has been affected multiple times over its history by intentionally harmful software.

New!!: Malware and Facebook malware · See more »

File binder

File binders are utility software that allow a user to "bind" multiple files together resulting in a single executable.

New!!: Malware and File binder · See more »

Fingerprint (computing)

In computer science, a fingerprinting algorithm is a procedure that maps an arbitrarily large data item (such as a computer file) to a much shorter bit string, its fingerprint, that uniquely identifies the original data for all practical purposesA.

New!!: Malware and Fingerprint (computing) · See more »

Firewall (computing)

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

New!!: Malware and Firewall (computing) · See more »

Floppy disk

A floppy disk, also called a floppy, diskette, or just disk, is a type of disk storage composed of a disk of thin and flexible magnetic storage medium, sealed in a rectangular plastic enclosure lined with fabric that removes dust particles.

New!!: Malware and Floppy disk · See more »

Fred Cohen

Frederick B. Cohen (born 1956) is an American computer scientist and best known as the inventor of computer virus defense techniques.

New!!: Malware and Fred Cohen · See more »

HTML email

HTML email is the use of a subset of HTML to provide formatting and semantic markup capabilities in email that are not available with plain text: Text can be linked without displaying a URL, or breaking long URLs into multiple pieces.

New!!: Malware and HTML email · See more »

IBM Personal Computer

The IBM Personal Computer, commonly known as the IBM PC, is the original version and progenitor of the IBM PC compatible hardware platform.

New!!: Malware and IBM Personal Computer · See more »

Identity theft

Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss.

New!!: Malware and Identity theft · See more »

Industrial espionage

Industrial espionage, economic espionage, corporate spying or corporate espionage is a form of espionage conducted for commercial purposes instead of purely national security.

New!!: Malware and Industrial espionage · See more »


The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide.

New!!: Malware and Internet · See more »

Jargon File

The Jargon File is a glossary and usage dictionary of slang used by computer programmers.

New!!: Malware and Jargon File · See more »


JavaScript, often abbreviated as JS, is a high-level, interpreted programming language.

New!!: Malware and JavaScript · See more »

John von Neumann

John von Neumann (Neumann János Lajos,; December 28, 1903 – February 8, 1957) was a Hungarian-American mathematician, physicist, computer scientist, and polymath.

New!!: Malware and John von Neumann · See more »

Kernel (operating system)

The kernel is a computer program that is the core of a computer's operating system, with complete control over everything in the system.

New!!: Malware and Kernel (operating system) · See more »

Linux malware

Linux malware includes viruses, trojans, worms and other types of malware that affect the Linux operating system.

New!!: Malware and Linux malware · See more »

Machine code

Machine code is a computer program written in machine language instructions that can be executed directly by a computer's central processing unit (CPU).

New!!: Malware and Machine code · See more »


The Macintosh (pronounced as; branded as Mac since 1998) is a family of personal computers designed, manufactured, and sold by Apple Inc. since January 1984.

New!!: Malware and Macintosh · See more »


macOS (previously and later) is a series of graphical operating systems developed and marketed by Apple Inc. since 2001.

New!!: Malware and MacOS · See more »

Macro (computer science)

A macro (short for "macroinstruction", from Greek μακρός 'long') in computer science is a rule or pattern that specifies how a certain input sequence (often a sequence of characters) should be mapped to a replacement output sequence (also often a sequence of characters) according to a defined procedure.

New!!: Malware and Macro (computer science) · See more »

Macro virus

In computing terminology, a macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application (e.g., word processors and spreadsheet applications).

New!!: Malware and Macro virus · See more »

Malicious Software Removal Tool

Microsoft Windows Malicious Software Removal Tool is a freely distributed virus removal tool developed by Microsoft for the Microsoft Windows operating system.

New!!: Malware and Malicious Software Removal Tool · See more »


Malvertising (a portmanteau of "malicious advertising") is the use of online advertising to spread malware.

New!!: Malware and Malvertising · See more »


Malwarebytes Inc.

New!!: Malware and Malwarebytes · See more »

Master boot record

A master boot record (MBR) is a special type of boot sector at the very beginning of partitioned computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond.

New!!: Malware and Master boot record · See more »

Microsoft Safety Scanner

Microsoft Safety Scanner is a free virus scanner similar to Windows Malicious Software Removal Tool that can be used to scan a system for computer viruses and other forms of malware.

New!!: Malware and Microsoft Safety Scanner · See more »

Microsoft Security Essentials

Microsoft Security Essentials (MSE) is an antivirus software (AV) that provides protection against different types of malicious software, such as computer viruses, spyware, rootkits, and trojan horses.

New!!: Malware and Microsoft Security Essentials · See more »

Microsoft Windows

Microsoft Windows is a group of several graphical operating system families, all of which are developed, marketed, and sold by Microsoft.

New!!: Malware and Microsoft Windows · See more »

Microsoft Word

Microsoft Word (or simply Word) is a word processor developed by Microsoft.

New!!: Malware and Microsoft Word · See more »

Morris worm

The Morris worm or Internet worm of November 2, 1988, was one of the first computer worms distributed via the Internet.

New!!: Malware and Morris worm · See more »


MS-DOS (acronym for Microsoft Disk Operating System) is an operating system for x86-based personal computers mostly developed by Microsoft.

New!!: Malware and MS-DOS · See more »

National Vulnerability Database

The National Vulnerability Database is the U.S. government repository of standards-based vulnerability management data represented using the Security Content Automation Protocol (SCAP).

New!!: Malware and National Vulnerability Database · See more »

NSA ANT catalog

The NSA ANT catalog is a 50-page classified document listing technology available to the United States National Security Agency (NSA) Tailored Access Operations (TAO) by the Advanced Network Technology (ANT) Division to aid in cyber surveillance.

New!!: Malware and NSA ANT catalog · See more »

Operating system

An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.

New!!: Malware and Operating system · See more »

Patch Tuesday

Patch Tuesday (also known as Update Tuesday) is an unofficial term used to refer to when Microsoft regularly releases security patches for its software products.

New!!: Malware and Patch Tuesday · See more »


Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.

New!!: Malware and Phishing · See more »

Plug-in (computing)

In computing, a plug-in (or plugin, add-in, addin, add-on, addon, or extension) is a software component that adds a specific feature to an existing computer program.

New!!: Malware and Plug-in (computing) · See more »

Portable Executable

The Portable Executable (PE) format is a file format for executables, object code, DLLs, FON Font files, and others used in 32-bit and 64-bit versions of Windows operating systems.

New!!: Malware and Portable Executable · See more »


A portmanteau or portmanteau word is a linguistic blend of words,, p. 644 in which parts of multiple words or their phones (sounds) are combined into a new word, as in smog, coined by blending smoke and fog, or motel, from motor and hotel.

New!!: Malware and Portmanteau · See more »

Potentially unwanted program

A potentially unwanted program (PUP) or potentially unwanted application (PUA) is software that a user may perceive as unwanted.

New!!: Malware and Potentially unwanted program · See more »

Privilege (computing)

In computing, privilege is defined as the delegation of authority over a computer system.

New!!: Malware and Privilege (computing) · See more »

Process (computing)

In computing, a process is an instance of a computer program that is being executed.

New!!: Malware and Process (computing) · See more »


Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.

New!!: Malware and Ransomware · See more »

Remote desktop software

In computing, the term remote desktop refers to a software or operating system feature that allows a personal computer's desktop environment to be run remotely on one system (usually a PC, but the concept applies equally to a server), while being displayed on a separate client device.

New!!: Malware and Remote desktop software · See more »

Removable media

In computer storage, some types of removable media are designed to be read to or written to by removable readers, writers and drives.

New!!: Malware and Removable media · See more »


Riskware, a portmanteau of risk and software, is a word used to describe software whose installation and execution poses a possible yet not definite risk to a host computer.

New!!: Malware and Riskware · See more »


A root kit is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

New!!: Malware and Rootkit · See more »

Safe mode

Safe mode is a diagnostic mode of a computer operating system (OS).

New!!: Malware and Safe mode · See more »


Scareware is a form of malware which uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users into buying unwanted software.

New!!: Malware and Scareware · See more »

Scripting language

A scripting or script language is a programming language that supports scripts: programs written for a special run-time environment that automate the execution of tasks that could alternatively be executed one-by-one by a human operator.

New!!: Malware and Scripting language · See more »

Security bug

A security bug or security defect is a software bug that can be exploited to gain unauthorized access or privileges on a computer system.

New!!: Malware and Security bug · See more »

Security hacker

A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network.

New!!: Malware and Security hacker · See more »

Server (computing)

In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients".

New!!: Malware and Server (computing) · See more »


Shamoon, also known as W32.DisTrack, is a modular computer virus discovered by Seculert in 2012, targeting recent 32-bit NT kernel versions of Microsoft Windows.

New!!: Malware and Shamoon · See more »

Single sign-on

Single sign-on (SSO) is a property of access control of multiple related, yet independent, software systems.

New!!: Malware and Single sign-on · See more »

Social engineering (security)

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.

New!!: Malware and Social engineering (security) · See more »

Software bug

A software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.

New!!: Malware and Software bug · See more »


is a Japanese multinational conglomerate corporation headquartered in Kōnan, Minato, Tokyo.

New!!: Malware and Sony · See more »

Sony BMG copy protection rootkit scandal

A scandal erupted in 2005 regarding Sony BMG's implementation of deceptive, illegal, and harmful copy protection measures on about 22 million CDs.

New!!: Malware and Sony BMG copy protection rootkit scandal · See more »


Spyware is software that aims to gather information about a person or organization sometimes without their knowledge, that may send such information to another entity without the consumer's consent, that asserts control over a device without the consumer's knowledge, or it may send such information to another entity with the consumer's consent, through cookies.

New!!: Malware and Spyware · See more »


Stegomalware is a type of malware that uses steganography to hinder detection.

New!!: Malware and Stegomalware · See more »


Stuxnet is a malicious computer worm, first uncovered in 2010.

New!!: Malware and Stuxnet · See more »


SunOS is a Unix-branded operating system developed by Sun Microsystems for their workstation and server computer systems.

New!!: Malware and SunOS · See more »


In computing, the superuser is a special user account used for system administration.

New!!: Malware and Superuser · See more »

System administrator

A system administrator, or sysadmin, is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi-user computers, such as servers.

New!!: Malware and System administrator · See more »

System File Checker

System File Checker (SFC) is a utility in Microsoft Windows that allows users to scan for and restore corruptions in Windows system files.

New!!: Malware and System File Checker · See more »

System Restore

System Restore is a feature in Microsoft Windows that allows the user to revert their computer's state (including system files, installed applications, Windows Registry, and system settings) to that of a previous point in time, which can be used to recover from system malfunctions or other problems.

New!!: Malware and System Restore · See more »

Targeted threat

Targeted threats are a class of malware destined for one specific organization or industry.

New!!: Malware and Targeted threat · See more »

Task manager

A task manager is a system monitor program used to provide information about the processes and programs running on a computer, as well as the general status of the computer.

New!!: Malware and Task manager · See more »

Threat (computer)

In computer security, a threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm.

New!!: Malware and Threat (computer) · See more »

Trojan Horse

The Trojan Horse is a tale from the Trojan War about the subterfuge that the Greeks used to enter the independent city of Troy and win the war.

New!!: Malware and Trojan Horse · See more »

Trojan horse (computing)

In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.

New!!: Malware and Trojan horse (computing) · See more »


Troy (Τροία, Troia or Τροίας, Troias and Ἴλιον, Ilion or Ἴλιος, Ilios; Troia and Ilium;Trōia is the typical Latin name for the city. Ilium is a more poetic term: Hittite: Wilusha or Truwisha; Truva or Troya) was a city in the far northwest of the region known in late Classical antiquity as Asia Minor, now known as Anatolia in modern Turkey, near (just south of) the southwest mouth of the Dardanelles strait and northwest of Mount Ida.

New!!: Malware and Troy · See more »


Typosquatting, also called URL hijacking, a sting site, or a fake URL, is a form of cybersquatting, and possibly brandjacking which relies on mistakes such as typos made by Internet users when inputting a website address into a web browser.

New!!: Malware and Typosquatting · See more »

United States Computer Emergency Readiness Team

The United States Computer Emergency Readiness Team (US-CERT) is an organization within the Department of Homeland Security’s (DHS) National Protection and Programs Directorate (NPPD).

New!!: Malware and United States Computer Emergency Readiness Team · See more »

Universal Time-Sharing System

The Universal Time-Sharing System (UTS) was an operating system for the XDS Sigma series of computers, succeeding Batch Processing Monitor (BPM)/Batch Time-Sharing Monitor (BTM).

New!!: Malware and Universal Time-Sharing System · See more »


Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.

New!!: Malware and Unix · See more »


VAX is a discontinued instruction set architecture (ISA) developed by Digital Equipment Corporation (DEC) in the mid-1970s.

New!!: Malware and VAX · See more »

Vulnerability (computing)

In computer security, a vulnerability is a weakness which can be exploited by a Threat Actor, such as an attacker, to perform unauthorized actions within a computer system.

New!!: Malware and Vulnerability (computing) · See more »

Windows Defender

Windows Defender (called Windows Defender Antivirus in Windows 10 Creators Update) is an anti-malware component of Microsoft Windows.

New!!: Malware and Windows Defender · See more »

Windows Update

Windows Update is a Microsoft service for the Windows 9x and Windows NT families of operating system, which automates downloading and installing software updates over the Internet.

New!!: Malware and Windows Update · See more »


Yahoo! is a web services provider headquartered in Sunnyvale, California and wholly owned by Verizon Communications through Oath Inc..

New!!: Malware and Yahoo! · See more »

Zombie (computer science)

In computer science, a zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.

New!!: Malware and Zombie (computer science) · See more »

Redirects here:

Attackware, Badware, Computer contaminant, Data stealing malware, Evasive malware, Hostile code, Jokeware, Junkware, MalSite, Malaware, Malicious Web Site, Malicious code, Malicious executable, Malicious executables, Malicious exploit, Malicious software, Malware types, Malwarelist, PE infection, Pestware, Poisoned file, Potentially-unwanted Programs, Scumware, Stealthware.


[1] https://en.wikipedia.org/wiki/Malware

Hey! We are on Facebook now! »