“An attacker is able to remotely control a system, including the ability to list directories, send and receive files, and execute programs. The backdoor operates with the privileges of the logged-on user.”
When you buy off-the-shelf peripherals such as this, it’s easy to assume they have been tested and are safe, and wouldn’t normally pose much of a security risk to your computer. Remember, however, that Humans made them, and so they are still subject to the same flaws (or subterfuge) that something you download from the Internet is.
Be First to Comment