Cyber Security 39: Zombie Computer

A zombie computer happens when the remote-controlled Trojan horse leaves hidden codes into a system that allows the hacker to control the computer using a remote. Hackers rely on various robot networks that help in creating the zombie computers so that they can do bad things.

It’s like going to someone’s house, and leaving a remote-controlled camera, or robot in the house.

You May Also Like

More From Author