compromised computer


Also found in: Dictionary, Medical, Legal.
Related to compromised computer: hacked

compromised computer

A computer that has a virus, Trojan or other malevolent program. See botnet.
References in periodicals archive ?
However, as noted earlier, some of the compromised computers may be flagged by the attackers as interesting and receive special manual treatment from them.
Transactional multifactor authentication delivered with an independent device (for example, a token or electronic key fob--a small device that is kept on a keychain that uses some electronic means to access something)--makes an attack more difficult because one of the authentication factors (the one-time password or PIN) is not communicated to the operator through the compromised computer.
Principle 2: NetD Operations Are Successful When a Compromised Computer Is No Longer Compromised
J, which is a PDF file that drops a back door onto the compromised computer if an affected product is installed.
But these days, when stolen data and compromised computer systems make headlines all too frequently, you may be concerned about how safe it is to file returns over the Internet.
Nearly two-thirds of the insiders compromised computer accounts, created unauthorized backdoor accounts, or used shared accounts in their attacks.
The compromised computer was run by a contract company that maintains a data center for fundraising activities.
A worm is a piece of software, similar to a virus, but with the property of using the originally compromised computer to infect additional computers.
The attack would have provided "persistent access" to the compromised computer and allowed the Russians to spy on user activity.
This malware exclusively uses USB devices for propagation, without leaving any evidence on the compromised computer.
Still, Stevens noted, the entire ad campaign cost him $23, or 6 cents for each compromised computer.
A worm which attempts to hijack home computers by using vulnerabilities in the system, has been identified in the wild, with any compromised computer becoming part of a botnet established to send out spam.