In order to run mass spam campaigns or DDoS (Distributed Denial of Service) attacks, cybercriminals need access to a lot of computing power. By infecting thousands or millions of users’ PCs, Macs and smartphones, the criminals can establish a network of ‘zombie machines’ – or a botnet – that they can then use for their illegal activities. Learn how they work, the consequences of their actions and how to ensure your devices don’t become part of a botnet.

botnet infographic

Utilizziamo i cookie per rendere migliore la tua esperienza sul nostro sito Web. Usando e navigando su questo sito li accetterai. Sono disponibili informazioni dettagliate sull'uso dei cookie su questo sito Web facendo clic sull'apposito link.

Accetta e chiudi