![]() ![]() It can also come in a form of “scare tactics” which in many times, a bot will appear telling users to install a certain software to get rid of the non-existent infection on their computer. This can often be in a form of clickbaity photos or videos. Just like other malwares, a malicious bot can infect your computer by downloading files online, or via social media or email. Malicious bots are self-propagating malware (it has the same ability as worms for self-propagating) that infects its host, and connects back to a “command and control center” for a botnet or bot network (a network of compromised computers and similar devices).Ī malicious bot can access user’s passwords, obtain financial information, log keystrokes, relay spam, launch denial-of-service (DoS) attacks, and open backdoors to an infected computer among many possible threats. A malicious bot can be used to gain control over someone’s computer. ![]() Bot (which came from the word “robot”, also known as internet bots, spiders, crawlers, and web bots) can either be used with good or bad intentions.īots can be used to perform repetitive tasks such as indexing search engines, or in automatic interaction with instant messaging (in replacement of human customer service representative), but they can also be in a form of malicious code.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |