Backdoor: Difference between revisions
Tags: Mobile edit Mobile web edit |
Tags: Mobile edit Mobile web edit |
||
| Line 13: | Line 13: | ||
==Why it is a problem== | ==Why it is a problem== | ||
Backdoors can be used to inject [[spyware]] in order to collect information on users.<ref name=":0">{{Cite web |last=Malwarebytes |title=Backdoor computing attakcs |url=https://www.malwarebytes.com/backdoor |url-status=live |archive-url=http://web.archive.org/web/20251229225937/https://www.malwarebytes.com/backdoor |archive-date=29 Dec 2025}}</ref> | Backdoors can be used to inject [[spyware]] in order to collect information on users. | ||
<ref name=":0">{{Cite web |last=Malwarebytes |title=Backdoor computing attakcs |url=https://www.malwarebytes.com/backdoor |url-status=live |archive-url=http://web.archive.org/web/20251229225937/https://www.malwarebytes.com/backdoor |archive-date=29 Dec 2025}}</ref> Backdoors are dangerous as they can be both officially implanted by project maintainers for various reasons or implanted by unofficial code contributors or distributors. | |||
==Examples== | ==Examples== | ||