A zombie computer or “bot” lets an unauthorized person gain control over it, a hacker, a malicious website or email or a tainted USB thumb drive is typically the source of infection. The zombie or bot patiently waits to be summoned to perform some nefarious task often as a part of an army of tens of thousands or even millions of zombie PCs called a botnet. Attackers can access list of zombie PCs and activate them to help execute DoS (Daniel of service) attacks against web site, to host phishing web sites or to send spam email message, tracing an attack back to its source leads only to an unwitting victim rather than the true attackers. Zombie infections are good at hiding so they are not noticed and escape removal, they often have file and process names similar or even identical to normal system file names and processes so users …
Read More »