Zombie (in the context of cybersecurity) is a computer that has been hacked and is under the control of an attacker without the owner’s knowledge. These compromised machines are often used to send spam, launch DDoS attacks, or perform other malicious activities as part of a botnet – a network of numerous zombie computers controlled by a hacker.
Computers typically become “zombies” after being infected with a virus, Trojan, or other malware that provides the attacker with remote access. The owner of the infected device may be unaware that their computer is being used for criminal purposes.
To protect your computer from turning into a zombie, it’s important to use antivirus software, a firewall, regularly update software and the OS, and exercise caution when opening suspicious links and email attachments. Timely detection of an infection can help prevent harm to both the device itself and other network users.