Maven (famous)@lemmy.zip to Programmer Humor@programming.dev · 1 month agoCupholder.exelemmy.zipimagemessage-square130fedilinkarrow-up1979arrow-down118
arrow-up1961arrow-down1imageCupholder.exelemmy.zipMaven (famous)@lemmy.zip to Programmer Humor@programming.dev · 1 month agomessage-square130fedilink
minus-squareSphks@lemmy.dbzer0.comlinkfedilinkarrow-up12·1 month agoThe thing is, harmful apps are now difficult to detect compared to years ago. The hackers prefer to get the control of your device without ruining it. https://en.m.wikipedia.org/wiki/Botnet
minus-squareTrainguyrom@reddthat.comlinkfedilinkEnglisharrow-up5·1 month agoThere’s even extreme edgecases where a compromised machine being part of a botnet actually improves security because the malware shores up security to help itself remain persistent and not find itself removed/blocked by other malware or attackers
deleted by creator
The thing is, harmful apps are now difficult to detect compared to years ago. The hackers prefer to get the control of your device without ruining it.
https://en.m.wikipedia.org/wiki/Botnet
There’s even extreme edgecases where a compromised machine being part of a botnet actually improves security because the malware shores up security to help itself remain persistent and not find itself removed/blocked by other malware or attackers