botnet

(redirected from compromised computer)
Also found in: Medical, Legal, Encyclopedia.
Related to compromised computer: hacked

bot·net

 (bŏt′nĕt′)
n.
A network of maliciously installed bots running on multiple computers.

botnet

(ˈbɒtˌnɛt)
n
(Telecommunications) (sometimes with a capital) a network of computers infected by a program that communicates with its creator in order to send unsolicited emails, attack websites, etc
[C20: from (ro)bot + net(work)]
References in periodicals archive ?
The attacker will then study the compromised computer and learn what software is used and work out possible ways to carry out fraudulent transactions.
After several hours on the phone with him--repeatedly trying to get her to pay for services (she refused) and claiming her computer was full of viruses (it did not appear to be)--my student ended the call without a working Netflix account and with a potentially compromised computer.
The department instructs that, if at all possible, companies should avoid using a potentially compromised computer system to communicate about an incident or to discuss the company's response.
Webinjects are used by a number of banking trojans to alter the content of a webpage when a user sees on compromised computer.
The team told the president that they have found a new way to extract information from an air-gapped network - that is, a network not connected to any other network - by using a compromised computer in the network transmit information from the network to a cell phone using a monitor as a radio transmitter.
Targeted attacks such as Disttrack in 2012 are commonly used for the purposes of industrial espionage to gain access to the confidential information or intellectual property on a compromised computer system or network.
That compromised computer is used by a botnet to lure new users by various means such as spam email.
Consider, to cite just one example, that the NYT had to stay on digital vigil for four full months so that it could 'identify every digital back door the hackers used' following which time it had to replace "every compromised computer and set up new defences in hopes of keeping hackers out".
It is a destructive malware that corrupts files on a compromised computer and overwrites the MBR (Master Boot Record) in an effort to render a computer unusable," Symantec says in a blog posting about the virus, which it called W32.
Without directly referring to the Saudi Aramco attack, Symantec, one of the world's largest Internet security companies, described the virus as a destructive malware that corrupts files on a compromised computer and overwrites the MBR (Master Boot Record) in an effort to render a computer unusable.
The user of the compromised computer is usually unaware that anything malicious has occurred.
Just as we can replace hardware, so can we rebuild a compromised computer.