Definitions

Sorry, no definitions found. Check out and contribute to the discussion of this word!

Etymologies

Sorry, no etymologies found.

Support

Help support Wordnik (and make this page ad-free) by adopting the word malcode.

Examples

  • When opened, malcode within the PDF attempts to exploit an old Adobe vulnerability in order to drop malware on the local computer.

    Beware swine flu spam, says Symantec | Sync Blog 2009

  • Media Surveillance, a German anti-piracy firm, said last year that one of its studies found 32 percent of pirated copies of Windows and hacks contained malcode.

    Sunbelt Blog Tom Kelchner 2010

  • - John Markoff, writing in the New York Times, has reported that SecureWorks researcher Joe Stewart found a distinctive algorithm - only ever published on Chinese web sites - used in the Hydraq Trojan which installed back-door malcode used in the attack on Google.

    Megite Technology News: What's Happening Right Now 2010

  • - John Markoff, writing in the New York Times, has reported that SecureWorks researcher Joe Stewart found a distinctive algorithm - only ever published on Chinese web sites - used in the Hydraq Trojan which installed back-door malcode used in the attack on Google.

    Megite Technology News: What's Happening Right Now 2010

  • "We take an all-hazards approach for reducing risk, so we're not just chasing the next malcode released by the bad guys," he said.

    CNET News.com 2010

  • Although the billions Microsoft loses to software pirates each year is bad enough, it's believed that pirated software can be a serious malcode vector as well.

    Sunbelt Blog Tom Kelchner 2010

  • Generic and behavior-based detections by the antivirus industry have improved thanks to the massive increase in new malcode, which number thousands per day.

    Help Net Security - News 2010

  • You can be sure it wasn't good, but the site (or code placed on it) clearly had measures set up to offer the malcode only on a visitor's first visit, so an analyst couldn't go any further.

    Security Bloggers Network Tom Kelchner 2010

  • A 2006 study by marketing intelligence firm IDC found that 25 percent of counterfeit software tried to install malcode when it was downloaded.

    Sunbelt Blog Tom Kelchner 2010

  • You can be sure it wasn't good, but the site (or code placed on it) clearly had measures set up to offer the malcode only on a visitor's first visit, so an analyst couldn't go any further.

    Security Bloggers Network Tom Kelchner 2010

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.