malicious code


Also found in: Dictionary.

malicious code

[mə¦lish·əs ′kōd]
(computer science)
Programming code that is capable of causing harm to availability, integrity of code or data, or confidentiality in a computing system; encompasses Trojan horses, viruses, worms, and trapdoors.
References in periodicals archive ?
Just like a PC, mass distribution of malicious code to mass users could result in a significant security threat.
Categories: February 22, 2010, Border security, Computer security, Electronic signatures, Fraud, Malicious code, Passports, Program evaluation, Risk assessment, Risk management, Securities fraud, Security assessments, Security policies, Security threats, Strategic planning
Given the effectiveness of web-based attacks, web hosting companies in the US and elsewhere need to step up their policing of published content, and ensure that malicious code is quickly removed, before innocent users get hit.
Network anomaly detection proved beneficial because previous knowledge of the malicious code was not needed to identify and isolate Zotob.
Websense said that it had seen examples of a blog being created and laced with malicious code and then the address being sent out to unwitting users via spam e-mails or over instant messaging services.
Symantec has a number of safeguards built into our virus lab security architecture to keep malicious code isolated, including air-gaping of this lab from the rest of the engineering networks.
As commercial interests continue to drive e-crime, malicious code is more likely to be hosted on local servers in the US and UK than in countries with less developed e-crime law enforcement policies.
Symantec DeepSight Alert Services provides personalized vulnerability and malicious code alerts to bridge the gap between security awareness and action.
SEOUL, South Korea -- Trojans remain the most reported malicious code in the third quarter according to recent findings from AhnLab Inc.
The report shows that the volume of attacks increased and malicious code became more covert, less recognizable and more targeted toward financial gain.
These certificates can be used to digitally sign a program containing malicious code of any type under the name of Microsoft Corporation.