compromised computer


Also found in: Dictionary, Medical, Legal.
Related to compromised computer: hacked

compromised computer

A computer that has a virus, Trojan or other malevolent program. See botnet.
References in periodicals archive ?
Transactional multifactor authentication delivered with an independent device (for example, a token or electronic key fob--a small device that is kept on a keychain that uses some electronic means to access something)--makes an attack more difficult because one of the authentication factors (the one-time password or PIN) is not communicated to the operator through the compromised computer.
Principle 2: NetD Operations Are Successful When a Compromised Computer Is No Longer Compromised
Still, Stevens noted, the entire ad campaign cost him $23, or 6 cents for each compromised computer.
A worm which attempts to hijack home computers by using vulnerabilities in the system, has been identified in the wild, with any compromised computer becoming part of a botnet established to send out spam.
Most network users have had the experience of receiving e-mail with a colleague's address as the sender, but which was in reality a forgery sent to the address directory in the e-mail program of a compromised computer.
APT attacks, cited as the subject of recent high-profile commercial investigations, are an orchestrated deployment of sophisticated and perpetual attacks that have systematically compromised computer networks in the public and private sector for years.
is intended to be delivered onto a compromised computer system by other malware for subsequent download into Mozilla Firefox's Plugin folder.
When installed on a PC, Spybot opens a back door in the system and connects to an Internet Relay Chat server to let the remote attacker control the compromised computer.
AC@mm) and is a mass-mailing worm that gathers email addresses from the compromised computer.
Hackers use rootkit technology to maintain access to a compromised computer without the user's knowledge.
Often the initial stub program sends out DNS queries looking for the mothership, itself often a compromised computer temporarily acting as a mothership.