Wednesday, February 22, 2017
Home Tags Backdoor

Tag: Backdoor

backdoor is a method, often secret, of bypassing normal authentication in a product, computer system, cryptosystem or algorithm etc. Backdoors are often used for securing unauthorized remote access to a computer, or obtaining access to plaintext in cryptographic systems.

A backdoor may take the form of a hidden part of a program, a separate program (e.g. Back Orifice may subvert the system through a rootkit), or may be a hardware feature. Although normally surreptitiously installed, in some cases backdoors are deliberate and widely known. These kinds of backdoors might have “legitimate” uses such as providing the manufacturer with a way to restore user passwords.

Default passwords can function as backdoors if they are not changed by the user. Some debugging features can also act as backdoors if they are not removed in the release version.

In 1993 the United States government attempted to deploy an encryption system, the Clipper chip, with an explicit backdoor for law enforcement and national security access. The chip was unsuccessful internationally and in business.

New Mac malware pinned on same Russian group blamed for election...

Enlarge (credit: Sumitcommunicationcyber) APT28, the Russian hacking group tied to last year's interference in the 2016 presidential election, has long been known for...

Caution! The cloud’s backdoor is your datacenter

“Great news, team: We’re moving to Amazon Web Services. We’ll get all of our services there, including data, compute, governance, and security.”  When you hear...

This modular backdoor malware is now the most common threat to...

For the first time in a year, Hummingbad isn't the most prolific form of malware on mobile devices

KopiLuwak: A New JavaScript Payload from Turla

On 28 January 2017, John Lambert of Microsoft (@JohnLaTwC) tweeted about a malicious document that dropped a “very interesting .JS backdoor“.Since the end of...

Americans “divided” on giving feds access to encrypted messages

But opinions have shifted since the FBI sued Apple to build a backdoor in a terrorist's iPhone.

Trump’s FBI boss, Attorney General picks reckon your encryption’s getting backdoored

This isn't going to end well US President Donald Trump's pick for his Attorney General and head of the FBI will have security specialists nervous,...

Cisco’s WebEx Chrome plugin will execute evil code, install malware via...

Just get rid of it – bin it now Malicious websites can remotely execute commands on Windows systems that have Cisco WebEx's Chrome extension installed.About...

Rap for crap WhatsApp trap flap: Yack yack app claptrap slapped

Security gurus condemn sensational reporting of encryption backdoor-that-wasn't Computer security experts and cryptographers have accused The Guardian of overblowing what was reported to be a...

Researchers ID Decades-Old 'Fruitfly' Mac Malware

It uses antiquated code, possibly to decrease chances of detection. A rare strain of malware known as "Fruitfly" appears to have been lurking in the...

Newly discovered Mac malware found in the wild also works well...

reader comments 32 Share this story A newly discovered family of Mac malware has been conducting detailed surveillance on targeted networks, possibly...

Porn Pirates Exploit YouTube 'Backdoor'

Adult websites are hosting explicit videos on Google's servers. Porn pirates are reportedly using a known YouTube backdoor to store infringing material on Google's servers...