- Backdoor programs are applications that open computers to access by remote systems. These programs typically respond to specially-built client programs but can be designed to respond to legitimate messaging applications.Bandage Damage Cleanup Template (DCT) is an immediate cleaning solution provided to address system infection cause by a specific malware.Blended threats are bundles of malicious programs that combine the functionality of different types of malware, including Trojans, worms and backdoors.A blocklist (also known as a blacklist) is a list of items in a set that are not accepted. In computer security, a blocklist may be used to exclude which set to detect, quarantine, block, or perform security scans on.Boot sector viruses infect the boot sector or the partition table of a disk. Systems are typically infected by these viruses when started with infected floppy disks.A bot is a remotely controlled Trojan which infects Internet-connected PCs and is remotely controlled by an attacker typically via private IRC channels.A botnet [short for bot network] is a network of hijacked zombie computers that are remotely controlled by a hacker. The hacker uses the network to send spam and launch Distributed Denial of Service [DDoS] attacks, and may rent the network out to other cybercA botnet (short for bot network) is a network of hijacked zombie computers controlled remotely by a hacker. The hacker uses the network to send spam and launch Denial of Service attacks, and may rent the network out to other cybercriminals.Browser Helper Objects (BHOs) are companion applications for Microsoft Internet Explorer. They usually come in the form of toolbars, search helpers, and monitoring applications.Business Email Compromise (BEC) is a type of scam targeting companies who conduct wire transfers and have suppliers abroad. Corporate or publicly available email accounts of executives or high-level employees related to finance or involved with wireAttacks classified as BPC or ‘business process compromise’ silently alter a part of specific business processes in order to generate significant monetary profit for the attackers.