Hackers can use command and control assaults to take control of whole networks or transform individual computers into a bot army to do whatever they want. This was obvious recently when the United States stopped the “Cyclops Blink” botnet by hacking into compromised devices and uninstalling the virus, but here’s what you should know about...