Our Terms of Service and Privacy Policy have changed.

By continuing to use this site, you are agreeing to the new Privacy Policy and Terms of Service.

Backdoor exploitation
Backdoor exploitation

By far the most common hack is backdoor exploitation. Nearly three-quarters (73%) of hacks involve the installation or manipulation of backdoor access in a computer.

After malware is installed and a computer is compromised, the hackers will want to make it easier to get back inside in the future.

A backdoor program allows hackers to bypass normal authentication processes, including logins, firewalls and other security controls. They often allow hackers to gain remote access or control of a computer.

Last updated July 29 2011: 5:11 AM ET
Join the Conversation
The cyber Mafia has already hacked you

Large, organized crime syndicates have been launching sophisticated attacks for decades.