In order to run mass spam campaigns or DDoS (Distributed Denial of Service) attacks, cybercriminals need access to a lot of computing power. By infecting thousands or millions of users’ PCs, Macs and smartphones, the criminals can establish a network of ‘zombie machines’ – or a botnet – that they can then use for their illegal activities. Learn how they work, the consequences of their actions and how to ensure your devices don’t become part of a botnet.

 
botnet infographic

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.

Accept and close