Recently discovered vulnerabilities (or bugs), not yet known to vendors or antivirus companies, that hackers can exploit.


A zombie computer is one connected to the Internet that, in appearance, is performing normally, but can be controlled by a hacker with remote access to it who sends commands through an open port. Zombies are mostly used to perform malicious tasks, such as spreading spam or other infected data to other computers, or launching DoS (Denial of Service) attacks, with the owner being unaware of it.

No hay comentarios:

Publicar un comentario

Más leídas este mes