Software that monitors, captures, modifies, or interferes with any network data traffic on computers or networks for malevolent purposes.
See complete list of properties