Executable content that can be embedded in Web pages or HTML e-mail. Mobile code helps make Web sites interactive, but malicious mobile code can be used to modify or steal data, and for other malevolent purposes.
A program downloaded from the internet that runs automatically on a computer with little or no user interaction.
Mobile code uses legitimate technologies such as Java applets and ActiveX controls as pathways for introducing malicious code, which may destroy programs and compromise system integrity. Mobile code attacks can modify data, steal passwords or files, redirect modem dial-ins or launch a Denial of Service attack. Malicious mobile code is usually executed without user knowledge or consent.
Software modules obtained from remote systems, transferred across a network, and then downloaded and executed on a local system without explicit installation or execution by the recipient. Malicious mobile code is designed, employed, distributed, or activated with the intention of compromising the performance or security of information systems and computers, increasing access to those systems, disclosing unauthorized information, corrupting information, denying service, or stealing resources.
Code or software that is transferred from a host to a client or to another host to be executed at the destination. A worm is an example of malicious mobile code.
Computer programs or parts of programs that are transmitted across a network and executed by a remote computer.
In computer science, mobile code is software obtained from remote systems, transferred across a network, and then downloaded and executed on a local system without explicit installation or execution by the recipient. Examples of mobile code include scripts (JavaScript, VBScript), Java applets, ActiveX controls, Flash animations, Shockwave movies (and Xtras), and macros embedded within Office documents.