malicious software
collocation in Englishmeaningsofmaliciousandsoftware
These words are often used together. Click on the links below to explore the meanings. Or,see other collocations withsoftware.
malicious
adjective
uk/məˈlɪʃ.əs/us/məˈlɪʃ.əs/
intended to harm or upset ...
See more atmalicious
software
noun[U]
uk/ˈsɒft.weər/us/ˈsɑːft.wer/
the instructions that control what a computer does; ...
See more atsoftware
(Definition ofmaliciousandsoftwarefrom theCambridge English Dictionary© Cambridge University Press)
Examplesofmalicious software
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
There seems to be a whole zoo ofmalicioussoftware.
From the
Hansard archive
Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0
It cannot be known how many of these systems are free ofmalicioussoftware.
FromEuroparl Parallel Corpus - English
Malicioussoftware—including viruses—is a global phenomenon.
From the
Hansard archive
Example from the Hansard archive. Contains Parliamentary information licensed under theOpen Parliament Licence v3.0
Users can also download anti-virus software that protects against threats and removesmalicioussoftwarefrom your system.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Defensive users think critically about the information they can access, to reduce their chances of downloading and spreadingmalicioussoftware.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Aside frommalicioussoftwarephoning home, phoning home may be done to track computer assetsespecially mobile computers.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Malicioussoftwarecan disrupt the functioning of computers in more ways than one.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
While this facility can be used to call functions dynamically, it is often a favorite technique of virus and othermalicioussoftwarewriters.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Finally, there are forms ofmalicioussoftwarethat rely on the weak knowledge of average users.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
A virus ismalicioussoftwaredesigned to spread to other computers by inserting itself into legitimate programs and running programs in parallel.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Malicioussoftwarecan exist in a multitude of different forms and many are misleading to general computer users and even some anti-malware software.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The study looked at the browser's capability to prevent users following socially engineered links of a malicious nature and downloadingmalicioussoftware.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The report also stated that, on average, the tool removesmalicioussoftwarefrom 1 in every 311 computers on which it runs.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
In particular, operator errors, physical disruptions, design errors, andmalicioussoftwareas items to be mitigated or eliminated.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Devices can also be bricked by malware (malicioussoftware) and sometimes by running software not intentionally harmful but with errors that cause damage.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Failure to do so can lead to bugs, slow performance, and at worst case, takeover by viruses andmalicioussoftware.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
One critical bug in any of these interactions may be enough formalicioussoftwareto take control over a machine.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The second goal is to conduct research covering data analysis approaches, unique security tool development and gathering data about attackers andmalicioussoftwarethey use.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Malicioussoftwaremay be able to get through a firewall and onto a system.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Because steganography secretly embeds additional, and nearly undetectable, information content in digital products, the potential for covert dissemination ofmalicioussoftware, mobile code, or information is great.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Want to learn more?
Go to the definition ofmalicious
Go to the definition ofsoftware
See other collocations withsoftware