1. /
  2. Security Response/
  3. Glossary/
  4. malicious code

Glossary

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | _1234567890

malicious code

Programs such as viruses, worms, logic bombs, and Trojan horses that are surreptitiously inserted into programs to destroy data, run destructive or intrusive programs, or otherwise compromise the security or integrity of the victim’s computer data.