Maven (famous)@lemmy.zip to Programmer Humor@programming.dev · 5 months agoCupholder.exelemmy.zipimagemessage-square130fedilinkarrow-up1998arrow-down118
arrow-up1980arrow-down1imageCupholder.exelemmy.zipMaven (famous)@lemmy.zip to Programmer Humor@programming.dev · 5 months agomessage-square130fedilink
minus-squareSphks@lemmy.dbzer0.comlinkfedilinkarrow-up12·5 months agoThe thing is, harmful apps are now difficult to detect compared to years ago. The hackers prefer to get the control of your device without ruining it. https://en.m.wikipedia.org/wiki/Botnet
minus-squareTrainguyrom@reddthat.comlinkfedilinkEnglisharrow-up5·5 months agoThere’s even extreme edgecases where a compromised machine being part of a botnet actually improves security because the malware shores up security to help itself remain persistent and not find itself removed/blocked by other malware or attackers
The thing is, harmful apps are now difficult to detect compared to years ago. The hackers prefer to get the control of your device without ruining it.
https://en.m.wikipedia.org/wiki/Botnet
There’s even extreme edgecases where a compromised machine being part of a botnet actually improves security because the malware shores up security to help itself remain persistent and not find itself removed/blocked by other malware or attackers