Comes in many forms and can be any program or source code
producing output that the computer owner does not need, want, or expect. For
example, malware can be a remote access Trojan
horse that can not only open a back door
to a remote computer but also control someoneÂ’s computer or network from a
remote location. Malware includes viruses, worms, Trojan horses (that can, for
example, spy on the system and display ads when the user least expects it), and
malicious active content arriving through email
or Web pages visited. These forms of malware normally run without the knowledge
and permission of the user.
See Also: Back
or Trap Door; Electronic Mail or Email; Trojan; Virus; Worm.
Spy Sweeper. Malware: Are you running malicious software? [Online, 2004.] Spy
Sweeper Website. http://www.spysweeper.com/malware.html.