programs exploiting system vulnerabilities
known as malicious software or malware
program fragments that need a host program
e.g. viruses, logic bombs, and backdoors
independent self-contained programs
e.g. worms, bots
replicating or not
Mulware is equipped with propagation mechanism and payloads
sophisticated threat to computer systems