malicious software

collocation in English

meaningsofmaliciousandsoftware

These words are often used together. Click on the links below to explore the meanings. Or,see other collocations withsoftware.
malicious
adjective
uk
/məˈlɪʃ.əs/
us
/məˈlɪʃ.əs/
intended to harm or upset ...
See more atmalicious
software
noun[U]
uk
/ˈsɒft.weər/
us
/ˈsɑːft.wer/
the instructions that control what a computer does; ...
See more atsoftware

(Definition ofmaliciousandsoftwarefrom theCambridge English Dictionary© Cambridge University Press)

Examplesofmalicious software

These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
There seems to be a whole zoo ofmalicioussoftware.
From the
Hansard archive
Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0
It cannot be known how many of these systems are free ofmalicioussoftware.
FromEuroparl Parallel Corpus - English
Malicioussoftware—including viruses—is a global phenomenon.
From the
Hansard archive
Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0
Users can also download anti-virus software that protects against threats and removesmalicioussoftwarefrom your system.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Defensive users think critically about the information they can access, to reduce their chances of downloading and spreadingmalicioussoftware.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Aside frommalicioussoftwarephoning home, phoning home may be done to track computer assetsespecially mobile computers.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Malicioussoftwarecan disrupt the functioning of computers in more ways than one.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
While this facility can be used to call functions dynamically, it is often a favorite technique of virus and othermalicioussoftwarewriters.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Finally, there are forms ofmalicioussoftwarethat rely on the weak knowledge of average users.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
A virus ismalicioussoftwaredesigned to spread to other computers by inserting itself into legitimate programs and running programs in parallel.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Malicioussoftwarecan exist in a multitude of different forms and many are misleading to general computer users and even some anti-malware software.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
The study looked at the browser's capability to prevent users following socially engineered links of a malicious nature and downloadingmalicioussoftware.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
The report also stated that, on average, the tool removesmalicioussoftwarefrom 1 in every 311 computers on which it runs.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
In particular, operator errors, physical disruptions, design errors, andmalicioussoftwareas items to be mitigated or eliminated.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Devices can also be bricked by malware (malicioussoftware) and sometimes by running software not intentionally harmful but with errors that cause damage.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Failure to do so can lead to bugs, slow performance, and at worst case, takeover by viruses andmalicioussoftware.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
One critical bug in any of these interactions may be enough formalicioussoftwareto take control over a machine.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
The second goal is to conduct research covering data analysis approaches, unique security tool development and gathering data about attackers andmalicioussoftwarethey use.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Malicioussoftwaremay be able to get through a firewall and onto a system.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
Because steganography secretly embeds additional, and nearly undetectable, information content in digital products, the potential for covert dissemination ofmalicioussoftware, mobile code, or information is great.
From
Wikipedia
This example is from Wikipedia and may be reused under a CC BY-SA license.
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Want to learn more?
Go to the definition ofmalicious
Go to the definition ofsoftware
See other collocations withsoftware