Backdoor: Difference between revisions
init |
m changed category to self |
||
(2 intermediate revisions by the same user not shown) | |||
Line 2: | Line 2: | ||
==How it works== | ==How it works== | ||
There are many types of backdoor. | |||
'''Backdoor malware''' | |||
A backdoor malware is a software that, when executed installs a backdoor into the system that executed it.<ref name=":0" /> This is often referred to as a ''Trojan''. These often use an unpatched exploit to gain access to the system. | |||
'''Propriatary backdoors''' | |||
A propriatary backdoor is a built-in backdoor; A backdoor that was intentionally placed there.<ref name=":0" /> These backdoors can be used for good or bad purposes. Some may exist for testing purposes. However, if left in the final product, may be susceptible to exploitation. Other built-in backdoors are used by the company for nefarious purposes. | |||
==Why it is a problem== | ==Why it is a problem== | ||
Backdoors can be used to inject [[spyware]] in order to collect information on users.<ref>{{Cite web |last=Malwarebytes |title=Backdoor computing attakcs |url=https://www.malwarebytes.com/backdoor}}</ref> | Backdoors can be used to inject [[spyware]] in order to collect information on users.<ref name=":0">{{Cite web |last=Malwarebytes |title=Backdoor computing attakcs |url=https://www.malwarebytes.com/backdoor}}</ref> | ||
==Examples== | ==Examples== | ||
* [[SecuRam installs backdoor on ProLogic series safe locks]]. | *[[SecuRam installs backdoor on ProLogic series safe locks]]. | ||
==References== | ==References== | ||
{{reflist}} | {{reflist}} | ||
[[Category: | [[Category:Backdoor]] |