Thesaurus.com
Thesaurus / maliciousness
FEEDBACK

EXAMPLE SENTENCES FROM THE WEB

In August, he revealed details of an Android vulnerability that allowed malicious apps to steal sensitive user data from other apps on the same device.
MOBILE SECURITY STARTUP OVERSECURED LAUNCHES AFTER SELF-FUNDING $1 MILLION, THANKS TO BUG BOUNTY PAYOUTSZACK WHITTAKERNOVEMBER 12, 2020TECHCRUNCH
An earthquake or even a “malicious actor” could cause damage to the pylons and attached tubes.
THE FIRST HYPERLOOP PASSENGERS JUST TOOK A SHORT BUT IMPORTANT RIDEROB VERGERNOVEMBER 11, 2020POPULAR SCIENCE
The 39-year-old City of Fairfax man was arrested and charged with two counts of malicious wounding.
FAIRFAX COUNTY CRIME REPORTNOVEMBER 11, 2020WASHINGTON POST
ZoomOpener bypassed a protocol designed to protect Mac users who click on malicious links.
ZOOM SETTLES FTC CASE ACCUSING IT OF PRIVACY MISSTEPS WITH NO FINEDZANEMORRISNOVEMBER 9, 2020FORTUNE
It gives election officials more time to deal with both normal mistakes and malicious attacks, and any problems that do arise affect fewer voters.
IT MIGHT NOT FEEL LIKE IT, BUT THE ELECTION IS WORKINGBOBBIE JOHNSONNOVEMBER 6, 2020MIT TECHNOLOGY REVIEW
After Fortune shared details of the phishing emails with SendGrid, the team said it “identified the traffic as malicious and immediately shut down the account” of the sender.
ARE CHINESE SPIES TRYING TO HACK THIS ANTICENSORSHIP STARTUP? ITS EXECS BELIEVE SORHHACKETTFORTUNENOVEMBER 5, 2020FORTUNE
The Senate Intelligence Committee concluded last year that Russia probably targeted election systems in all 50 states in 2016, identifying malicious activity more extensive than officials originally acknowledged.
OFFICIALS STRESS SECURITY OF ELECTION SYSTEMS AFTER U.S. REVEALS NEW IRANIAN AND RUSSIAN EFFORTSAMY GARDNER, ISAAC STANLEY-BECKER, ELISE VIEBECKOCTOBER 29, 2020WASHINGTON POST
Through analyzing internet traffic patterns and detecting malicious actors out there, and then build that protection into our networking and enterprise security products.
THE FOURTH INDUSTRIAL REVOLUTION HAS BEGUN: NOW’S THE TIME TO JOINJASON SPARAPANIOCTOBER 15, 2020MIT TECHNOLOGY REVIEW
If they turn out to be malicious, add them to the disavow file, download it, and submit it to Google’s Disavow Links Tool.
8 MAJOR GOOGLE ALGORITHM UPDATES, EXPLAINEDSPONSORED CONTENT: SEO POWERSUITEOCTOBER 13, 2020SEARCH ENGINE LAND
Because Solve creates very granular permissions, down to the row level in a database table, for example, when malicious actors do get into the system, they will only be able to access a small slice of the available data.
SOLVO RAISES $3M SEED ROUND TO AUTOMATICALLY MANAGE CLOUD INFRASTRUCTURE PERMISSIONSFREDERIC LARDINOISOCTOBER 7, 2020TECHCRUNCH

WORDS RELATED TO MALICIOUSNESS

Roget's 21st Century Thesaurus, Third Edition Copyright © 2013 by the Philip Lief Group.

WORD OF THE DAY

manavelinsplural noun | [muh-nav-uh-linz ]SEE DEFINITION