Dosjdhdjdjdhdjdjdj (talk | contribs)
Tags: Mobile edit Mobile web edit
Dosjdhdjdjdhdjdjdj (talk | contribs)
Tags: Mobile edit Mobile web edit
Line 13: Line 13:


==Why it is a problem==
==Why it is a problem==
Backdoors can be used to inject [[spyware]] in order to collect information on users.<ref name=":0">{{Cite web |last=Malwarebytes |title=Backdoor computing attakcs |url=https://www.malwarebytes.com/backdoor |url-status=live |archive-url=http://web.archive.org/web/20251229225937/https://www.malwarebytes.com/backdoor |archive-date=29 Dec 2025}}</ref>
Backdoors can be used to inject [[spyware]] in order to collect information on users.
<ref name=":0">{{Cite web |last=Malwarebytes |title=Backdoor computing attakcs |url=https://www.malwarebytes.com/backdoor |url-status=live |archive-url=http://web.archive.org/web/20251229225937/https://www.malwarebytes.com/backdoor |archive-date=29 Dec 2025}}</ref> Backdoors are dangerous as they can be both officially implanted by project maintainers for various reasons or implanted by unofficial code contributors or distributors.


==Examples==
==Examples==