When a hacker makes a zombie computer, he infiltrates an unsuspecting victim’s computer and uses it to conduct illegal activities. The user may be unaware that his computer has been taken over. Check out our HowStuffWorks article to learn more.
Learn more about your ad-choices at https://www.iheartpodcastnetwork.com
See omnystudio.com/listener for privacy information.
Give Feedback About This Article