Select Page

Cyren Security Blog

The Cyren Security Blog is where Cyren engineers and thought leaders provide insights, research and analysis on a range of current cybersecurity topics.

Legitimate Botnets Do Exist

Although the term ‘botnet’ is generally associated with cybercrime and maliciousness, it should come as no surprise that there are, in fact, fully legitimate and entirely useful botnets—better known as “distributed computing systems”—at work around the globe. In fact, someone you know may even have willingly allowed their computer to become part of one.

At their core, botnets are nothing more than a group of Internet-connected devices typically installed with some form of software that enables these devices to collectively perform a function and carry out commands generated by someone controlling the system. By spreading the computing power across multiple platforms, tasks can be accomplished more quickly, efficiently, and at less cost. While ‘botnets’ are typically only designed with criminal intent, ‘distributed computing’ projects are often created for the greater good.

Perhaps the most famous distributed computing project is [email protected] Using the Berkeley Open Infrastructure for Network Computing (BOINC) software platform and hosted by the Space Sciences Laboratory at the University of California, Berkeley, [email protected] employs the unused CPU and GPU cycles on a network of volunteer computers to analyze radio signals captured by the Arecibo radio telescope to search for possible evidence of extraterrestrial intelligence.

Other well known distributed computing projects focus on resource intensive computing tasks such as climate modeling and prediction, astrophysics, stock market prediction, molecular biology, and mathematics.

To get further up to speed on botnets, download Cyren’s free special threat report on botnets.

Want to learn more about cloud-based email & web security? Contact us here!


See Cyren in action with the Cyren Inbox Security demo.

Get the Demo

You might also like

Phishing with QR codes

Don’t Scan or be Scammed By Maharlito Aquino, Kervin Alintanahin and Dexter To In 1994, a type of the matrix barcode known as the Quick Response code, now widely known as QR code, was invented by Masahiro Hara from a Japanese company Denso Wave. The purpose of the...