Cupholder.exelemmy.zipimage Maven (famous) ( @Maven@lemmy.zip ) Programmer Humor@programming.dev • 4 months ago message-square36fedilinkarrow-up1534
arrow-up1534imageCupholder.exelemmy.zip Maven (famous) ( @Maven@lemmy.zip ) Programmer Humor@programming.dev • 4 months ago message-square36fedilink
minus-square Sphks ( @Sphks@lemmy.dbzer0.com ) linkfedilink7•4 months agoThe thing is, harmful apps are now difficult to detect compared to years ago. The hackers prefer to get the control of your device without ruining it. https://en.m.wikipedia.org/wiki/Botnet
minus-square Trainguyrom ( @Trainguyrom@reddthat.com ) linkfedilinkEnglish4•4 months agoThere’s even extreme edgecases where a compromised machine being part of a botnet actually improves security because the malware shores up security to help itself remain persistent and not find itself removed/blocked by other malware or attackers
The thing is, harmful apps are now difficult to detect compared to years ago. The hackers prefer to get the control of your device without ruining it.
https://en.m.wikipedia.org/wiki/Botnet
There’s even extreme edgecases where a compromised machine being part of a botnet actually improves security because the malware shores up security to help itself remain persistent and not find itself removed/blocked by other malware or attackers