360 odd tiger using the "back door" What took the user – odd tiger 360
CCTV over nude photos from "back door" Software
Recently, CCTV horse named host of "nude" incident created a great sensation, according to court the evidence submitted, the reason why their photos were stolen, because of its Computer Is a "back door software" invasion. At present, the use of "backdoor" software, the hackers have stolen nude named Ma subject to severe legal sanctions.
According to security Expert Analysis, this "back door" software prototype, known as "dove gray" back door. Class by using the gray pigeons "backdoor software", hackers can remotely control the user's computer to steal bank account numbers, access to user privacy information, etc..
Experts Jie Black: Qihoo 360 to 260 million users to implant the "back door"
Security experts found that 360 security guards in the installation into the user computer, secretly set up the "back door." In this case broke, the odd tiger after the company tried to burst out of the "loopholes" to hide their "existence of the back door" of the facts. In fact, the "back door 360" is a software development staff deliberately put them, while the "loophole" is the programmers inadvertently caused the error. One is intentional, one not, both completely different in nature. Software does not properly prepared to place the "back door" security protection as the user's security software can not be any more "back door", only hack it for an improper purpose, to steal user information by adding the "back door."
"Back door" software four major hazards
According to experts, the back door software has four major hazards:
First, the remote control of a computer. Through "back doors" can be as local as hackers and remote control of a computer. In early 2007, the Haidian District People's Court heard together to hacking, the criminal who Lee using the "back door" virus was the victim nude extort 70,000 yuan successfully.
Second, steal bank accounts, stock accounts, online game accounts. Through the "back door", the hacker can control the user's computer input, if the user operating bank accounts, stock accounts, hackers steal account password information, and to take account of the funds transferred to the user a huge loss. November 2009, Jiangsu Provincial Public Security Bureau uncovered the "meek" hacker group case, the group using Trojans, backdoor to steal online game accounts, etc., illegal invasion of more than 1200 kinds of sites, at least 800 million gamers in the game account password, games and equipment stolen, involving up to 30 million.
Third, control Server To launch network attacks. June 2009, a 15-year-old South Korean youth use the "back door" software, the invasion of Yantai, a network operator's core Router , Resulting in a large number of Internet cafes in Yantai congestion more than an hour, causing direct economic losses to the Yantai more than 40,000 yuan.
Fourth, real-time monitoring user access to open "back door", the hacker can control the compromised computer thoroughly, whether users online chat, or stock, the game will be peeping into hackers, or even steal something of value, such as the QQ number, account number and other online games.
Qihoo 360 using the "back door" monitor users of information
The past year, many users install the 360 security guards after the reaction, computer online slow. After expert analysis, as odd tiger 360 security guards stole From a user's private information, take up a tremendous bandwidth, causing users to the Internet so slow. However, due to "360 back door" to run in the bottom of the system, users find difficult. Until February 2010, experts in the inspection holes 360 security guards, the chance to discover the backdoor functionality.
This point, the odd tiger 360 to the user computer to install the "back door" to steal user information, monitor only the situation of Internet users conduct a thorough opened.
I am an expert from fiber-optic-multiplexer.com, while we provides the quality product, such as 10/100M Media Converter , EOP 16E1/Ethernet converter, pdh multiplexer,and more.