There were Websites (90’s). Then there were Apps (2000’s). Now there are BOTs. Some call it the BOT RUSH.
A bot is software that is designed to automate the kinds of tasks you would usually do on your own, like making a dinner reservation, adding an appointment to your calendar or fetching and displaying information. The increasingly common form of bots, chatbots, simulate conversation. They often live inside messaging apps — or are at least designed to look that way. Some bots are used to handle a variety of customer service requests, which would normally require a telephone call to a human agent.
The largest use of bots is in web spidering (web crawler), in which an automated script fetches, analyzes and files information from web servers at many times the speed of a human. More than half of all web traffic is made up of bots.
The increasing use of consumer technology has made people impatient, especially when it comes to customer service. Social media helped streamline those conversations, and now bots can automate them. Bots, an army of automated agents, simply automate things that companies are currently paying humans to do. So some value may be more about cost savings than new revenue streams.
Other side of the coin: Malicious bots have the “worm-like ability to self- propagate,” and can also:
• Gather passwords
• Log keystrokes
• Obtain financial information
• Relay spam
• Capture and analyze packets
• Launch DoS attacks
• Open back doors on the infected computer
• Exploit back doors opened by viruses and worms
How do i know if my computer is infected with bots?
• Internet access is slow for no apparent reason.
• The computer crashes for no apparent reason.
• The fan goes into overdrive when the device is idle.
• The computer takes a long time to shut down, or fails to shut down correctly.
• Pop-up windows and advertisements appear even when you aren’t using a web browser.
• Friends and family receive email messages you did not send.
• Computer programs are running slowly.
• Settings have changed, and there’s no way to reverse them.
• The browser features components you didn’t download.
• Never click on anything suspicious
• Utilize anti-malware techniques to the fullest extent.U
• Install firewalls to block malicious attacks and never turn them off.
• Use a long and complicated password that contains numbers and symbols.
• Never use the same password for multiple programs.
• Install quality anti-malware software.
• Ensure software is up to date, and never ignore system updates.
• Refrain from using flash drives, or thumb drives, in an infected computer.