compromised computer


Also found in: Dictionary.
Related to compromised computer: hacked

compromised computer

A computer that has a virus, Trojan or other malevolent program. See botnet.
References in periodicals archive ?
The indictment further alleged that the defendants then collected files and other information from the compromised computers and stole this data.
However, as noted earlier, some of the compromised computers may be flagged by the attackers as interesting and receive special manual treatment from them.
That compromised computer is used by a botnet to lure new users by various means such as spam email.
Consider, to cite just one example, that the NYT had to stay on digital vigil for four full months so that it could 'identify every digital back door the hackers used' following which time it had to replace "every compromised computer and set up new defences in hopes of keeping hackers out".
"It is a destructive malware that corrupts files on a compromised computer and overwrites the MBR (Master Boot Record) in an effort to render a computer unusable," Symantec says in a blog posting about the virus, which it called W32.Disttrack.
"We will ensure that we will further reinforce our systems with all available means to protect against a recurrence of this type of cyber-attack." Without directly referring to the Saudi Aramco attack, Symantec, one of the world's largest Internet security companies, described the virus as a destructive malware that corrupts files on a compromised computer and overwrites the MBR (Master Boot Record) in an effort to render a computer unusable.
To a large extent it doesn't matter who was behind the creation and release of Stuxnet; that it compromised computer systems at Bushehr is almost beside the point.
The user of the compromised computer is usually unaware that anything malicious has occurred.
Just as we can replace hardware, so can we rebuild a compromised computer.
Symantec Security Response has confirmed that the attack involves Trojan.Pidief.J, which is a PDF file that drops a back door onto the compromised computer if an affected product is installed.
But these days, when stolen data and compromised computer systems make headlines all too frequently, you may be concerned about how safe it is to file returns over the Internet.
Nearly two-thirds of the insiders compromised computer accounts, created unauthorized backdoor accounts, or used shared accounts in their attacks.