{"id":7302,"date":"2015-08-10T01:15:34","date_gmt":"2015-08-09T17:15:34","guid":{"rendered":"http:\/\/staging.bankvaultonline.com\/?p=1274"},"modified":"2015-08-10T01:15:34","modified_gmt":"2015-08-09T17:15:34","slug":"definition-riskware","status":"publish","type":"post","link":"https:\/\/www.bankvault.com\/definition-riskware\/","title":{"rendered":"Definition of the day: Riskware"},"content":{"rendered":"
There\u2019s a saying, \u2018Guns don\u2019t kill people, people do.\u2019 So it is with riskware<\/strong>. ‘Riskware doesn\u2019t hack people, people do.\u2019 Riskware is the name given to legitimate software that can be used for hacking purposes if it is exploited by malicious hackers. Basically, any software that can remotely use the machine, delete, block, disrupt networks or copy data could be a candidate for riskware.<\/p>\n More specifically, the following types of programs have been hijacked by hackers to aid and abet theft , spying and intrusion.<\/p>\n One example of riskware is used to steal information involves the program WinVNC. This program allows users to have full, remote access to the machine on which it is installed. Security researchers have found several examples of WinVNC being surreptitiously installed on machines and then being used to allow the hacker full access to the machine, resulting in loss of data and theft.<\/p>\n So how do you ascertain whether a program is being used for good or bad? First and most obvious, ask yourself if you approved the installation of the program. If not, it was probably put there to exploit you. Second, look where the program is installed. If it\u2019s not installed in the most obvious Windows application folder, it was likely injected and installed on your machine \u2013 to be used later – without your knowledge.<\/p>\n A current antivirus program can help detect riskware.<\/p>\n","protected":false},"excerpt":{"rendered":" There\u2019s a saying, \u2018Guns don\u2019t kill people, people do.\u2019 So it is with riskware. ‘Riskware doesn\u2019t hack people, people do.\u2019 Riskware is the name given to legitimate software that can be used for hacking purposes if it is exploited by malicious hackers. Basically, any software that can remotely use the machine, delete, block, disrupt networks […]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[346],"tags":[23,263,402,236,403,48,404],"class_list":["post-7302","post","type-post","status-publish","format-standard","hentry","category-definition-of-the-day","tag-cyber-security","tag-definition-of-the-day","tag-dialing-programs","tag-hacking","tag-irc-chat","tag-malware","tag-riskware"],"yoast_head":"\n\n