'''Botnet Attacks''' involve networks of infected computers controlled by a hacker or "botherder"<ref name="norton">[http://us.norton.com/botnet/ Bots and Botnets—A Growing Threat], Symantec Corporation</ref> without the consent of the computers' owners.<ref name="kasper">[http://usa.kaspersky.com/internet-security-center/threats/botnet-attacks#.Ut269fbTmfQ Botnet Attack Information], Kaspersky Lab</ref><ref name="shadow">[http://www.shadowserver.org/wiki/pmwiki.php/Information/Botnets Botnets], Shadowserver.org</ref> These infected computers can be used in complex cyberattacks, including but not limited to [[Fast Flux]] attacks where the controller uses the botnet to hide his or her location, [[Spam]] attacks, DDOS attacks, and [[Phishing]] attacks, all without the knowledge of the computer's owner.<ref name="norton"/><ref name="shadow"/> | '''Botnet Attacks''' involve networks of infected computers controlled by a hacker or "botherder"<ref name="norton">[http://us.norton.com/botnet/ Bots and Botnets—A Growing Threat], Symantec Corporation</ref> without the consent of the computers' owners.<ref name="kasper">[http://usa.kaspersky.com/internet-security-center/threats/botnet-attacks#.Ut269fbTmfQ Botnet Attack Information], Kaspersky Lab</ref><ref name="shadow">[http://www.shadowserver.org/wiki/pmwiki.php/Information/Botnets Botnets], Shadowserver.org</ref> These infected computers can be used in complex cyberattacks, including but not limited to [[Fast Flux]] attacks where the controller uses the botnet to hide his or her location, [[Spam]] attacks, DDOS attacks, and [[Phishing]] attacks, all without the knowledge of the computer's owner.<ref name="norton"/><ref name="shadow"/> |