botnet

(redirected from compromised computer)
Also found in: Encyclopedia.
Related to compromised computer: hacked

bot·net

 (bŏt′nĕt′)
n.
A network of maliciously installed bots running on multiple computers.

botnet

(ˈbɒtˌnɛt)
n
(Telecommunications) (sometimes with a capital) a network of computers infected by a program that communicates with its creator in order to send unsolicited emails, attack websites, etc
[C20: from (ro)bot + net(work)]
References in periodicals archive ?
BalkanRAT enables the attackers to remotely control the compromised computer manually, via a graphical interface.
They installed malware and tools on the compromised computer systems to further compromise the computer networks of the victim businesses, after which they identified data of interest, including personally identifiable information (PII) and confidential business information, the indictment alleged.
The phishing email led to the installation of malware that allowed unauthorized access to the bank's computer systems through a compromised computer workstation, the bank said.<br />The malicious code allowed the compromised workstation to network with a second workstation with the ability to manage customer's accounts and their use of ATMs and bankcards.
You must isolate, preserve and document compromised computer systems and networks to contain the damage.<br /> Notify affected individuals as required by law.
* Avoid using a compromised computer system to communicate.
The attacker will then study the compromised computer and learn what software is used and work out possible ways to carry out fraudulent transactions.
After several hours on the phone with him--repeatedly trying to get her to pay for services (she refused) and claiming her computer was full of viruses (it did not appear to be)--my student ended the call without a working Netflix account and with a potentially compromised computer.
Security breaches don't take much time or bandwidth to be effective, and any compromised computer system can have value to criminal, Vadapalli says.
The department instructs that, if at all possible, companies should avoid using a potentially compromised computer system to communicate about an incident or to discuss the company's response.
Webinjects are used by a number of banking trojans to alter the content of a webpage when a user sees on compromised computer. The trojan is able to inject code such as JavaScript into the browser to interact with the website content and perform various actions.
The team told the president that they have found a new way to extract information from an air-gapped network - that is, a network not connected to any other network - by using a compromised computer in the network transmit information from the network to a cell phone using a monitor as a radio transmitter.
Targeted attacks such as Disttrack in 2012 are commonly used for the purposes of industrial espionage to gain access to the confidential information or intellectual property on a compromised computer system or network.