Backdoor exploitation
Backdoor exploitation

By far the most common hack is backdoor exploitation. Nearly three-quarters (73%) of hacks involve the installation or manipulation of backdoor access in a computer.

After malware is installed and a computer is compromised, the hackers will want to make it easier to get back inside in the future.

A backdoor program allows hackers to bypass normal authentication processes, including logins, firewalls and other security controls. They often allow hackers to gain remote access or control of a computer.


Last updated July 29 2011: 5:11 AM ET
Join the Conversation
The cyber Mafia has already hacked you

Large, organized crime syndicates have been launching sophisticated attacks for decades.

Search for Jobs