<img src="https://d5nxst8fruw4z.cloudfront.net/atrk.gif?account=5DiPo1IWhd1070" style="display:none" height="1" width="1" alt=""/>

In order to run mass spam campaigns or DDoS (Distributed Denial of Service) attacks, cybercriminals need access to a lot of computing power. By infecting thousands or millions of users’ PCs, Macs and smartphones, the criminals can establish a network of ‘zombie machines’ – or a botnet – that they can then use for their illegal activities. Learn how they work, the consequences of their actions and how to ensure your devices don’t become part of a botnet.

botnet infographic