When a hacker makes a zombie computer, he infiltrates an unsuspecting victim's computer and uses it to conduct illegal activities. The user may be unaware that his computer has been taken over. Check out our HowStuffWorks article to learn more.
Learn more about your ad-choices at https://www.iheartpodcastnetwork.com

The Story: How Science Fiction Changes the Real World
30:44

NASA and AI: Decoding Our Universe
33:53

Week in Tech: The Year of the Robot?
28:40