In order to run mass spam campaigns or DDoS (Distributed Denial of Service) attacks, cybercriminals need access to a lot of computing power. By infecting thousands or millions of users’ PCs, Macs and smartphones, the criminals can establish a network of ‘zombie machines’ – or a botnet – that they can then use for their illegal activities. Learn how they work, the consequences of their actions and how to ensure your devices don’t become part of a botnet.

botnet infographic

Vi bruger cookies til at gøre din oplevelse af vores websteder bedre. Ved at bruge og navigere videre på dette websted, accepterer du dette. Detaljerede oplysninger om brugen af cookies på denne hjemmeside er tilgængelige ved at klikke på "Flere oplysninger".

Accepter og luk