Examples of using Malicious application in English and their translations into Spanish
{-}
-
Colloquial
-
Official
It is not a malicious application and comes from legitimate sources;
It is very likely that you will need to remove more than just one malicious application.
A malicious application disguised in this manner is known as a"Trojan.".
Com every day because there is a malicious application installed on their computers.
The malicious application has only one purpose which is to profit from you!
Otherwise, you can agree to install malicious application on your computer.
Impact: A malicious application may be able to read restricted memory.
It offers a proactive method to detect the viral profile of any malicious application.
Impact: A malicious application may be able to execute unsigned code.
Exploitation of these issues depends on users downloading and installing a malicious application.
Net is not a malicious application, there is nothing useful about it either.
This could allow a malicious application to change your synced feeds.
Moreover, the malicious application is also capable of stealing your personal data.
LazagneCrypt Ransomware is a serious malicious application that appears on users' computers uninvited.
It is not a malicious application, however, it can cause plenty of disturbances.
Although GoldenCoupon is not a malicious application, it still lowers your cyber security level.
Impact: A malicious application may be able to modify protected disk locations.
An example of a malicious application that has successfully entered Google Play.
Impact: A malicious application may be able to cause a system denial of service.
Impact: A malicious application may be able change the password of a local user.
Impact: A malicious application can cause an unexpected system termination.
Impact: A malicious application may be able to leak sensitive user information.
Impact: A malicious application may be able to identify the Apple ID of the user.
Webdir is malicious application that can compromise a system without the user's permission.
Impact: A malicious application may be able to modify protected parts of the file system.
Impact: A malicious application may be able to bypass background execution restrictions.
Impact: A malicious application may be able to leak sensitive user information.
Impact: A malicious application may be able to initiate FaceTime calls without user authorization.
Impact: A malicious application may cause unexpected changes in memory shared between processes.