HP and backdoor hacking
Date: December 22, 2007Source: itbusinessedge.com
The story defines three types of backdoors: Special credential backdoors are hard-coded passwords or keys that provide immediate access; hidden functionality backdoors let a hacker issue commands automatically; and rootkit backdoors hide activity from system administrators.
Though the story is, for the most part, frightening, it is predicated on a bit of good news: Veracode has added features to its SecurityReview application scanning service that Higgins says can detect “some of these backdoor programs.” This, we guess, is somewhat reassuring.
Original article
Add comment Email to a Friend