Also found in: Dictionary, Medical, Legal, Encyclopedia, Wikipedia.
Graphic Thesaurus  🔍
Display ON
Animation ON
  • adj

Synonyms for malicious

Synonyms for malicious

Antonyms for malicious

having the nature of or resulting from malice


References in periodicals archive ?
Once installed, the malicious software "primarily focused on stealing files and uploading live location data," Beer said, adding it had been able to access encrypted messenger apps like Telegram, WhatsApp and iMessage.
'This malicious conspiracy continues as an attempt to topple me as Perak exco member and to sabotage Perak Mentri Besar Datuk Seri Ahmad Faizal Azumu's leadership in view of the swearing-in ceremony for the state exco line-up,' he said in a statement here tonight.
Many malicious apps are designed to mimic the most popular apps on the platform, with similar logos and designs.
The file format is used by Internet Explorer for its web archives and a user only needs to open the malicious attachment received either by email, messenger, or any other file transfer service, Mashable reports.
The newly discovered PirateMatryoshka malware carries a Trojan-downloader (malware that downloads malicious installers) disguised as a hacked version of legitimate software used in everyday PC activity.
As such, the development of ICT technology and the evolution of malicious code are closely related.
The contractor successfully moved to strike the notice of lis pendens and then while the underlying litigation remained pending filed this action alleging malicious prosecution.
Japanese IT security company Trend Micro has claimed that it has found two malicious apps which drop wide-reaching banking malware.
Summary: The global outbreak in malicious cryptocurrency mining that unfolded in 2018 saw the number of attacks increase by more than …
Read more about how malicious cryptocurrency mining displaced it here .
The latest figures from the Home Office have revealed that there were 522 malicious false fire alarms made in our region in 2017-18, or about 10 a week.
Apple Inc and Inc denied a Bloomberg Businessweek report on Thursday that said their systems had been infiltrated by malicious computer chips inserted by Chinese intelligence agents.
Using bogus forms, the malicious fakes phish for credit card details and/or login credentials to the impersonated legitimate services.
Akinsemoyin and one Musa Kalamu were arrested and subsequently arraigned on July 7, 2015, before Igbosere Magistrates' Court on three counts of conspiracy, malicious damage, breach of public peace and unlawful demolition.