The term botnet is a portmanteau word made with the terms ‘ro bot‘ and ‘ network’. Together, all these infected computers will form a botnet (or a zombie army). Very often, they will make it “work” with other zombies. But instead of aiming only to install a keylogger and steal your personal data, the malicious software will transform your computer into a zombie: thanks to this infection, the hackers can control it remotely. Worry it might happen to you? Follow our advice on how to prevent your computer from becoming a zombie.Ī zombie computer is the result of a cyber-attack similar to a traditional Trojan horse attack (a malicious code wrapped inside a regular behaving code). For example, a hacker could use your device to send out spam or, even worse, to attack other computers or IT systems. A zombie attack aimed either to steal your sensitive information or to make your computer do things that it normally shouldn’t. “Zombie” is the term used when an attacker takes control of your computer without your knowledge.
0 Comments
Leave a Reply. |