{"id":7302,"date":"2015-08-10T01:15:34","date_gmt":"2015-08-09T17:15:34","guid":{"rendered":"http:\/\/staging.bankvaultonline.com\/?p=1274"},"modified":"2015-08-10T01:15:34","modified_gmt":"2015-08-09T17:15:34","slug":"definition-riskware","status":"publish","type":"post","link":"https:\/\/www.bankvault.com\/definition-riskware\/","title":{"rendered":"Definition of the day: Riskware"},"content":{"rendered":"

There\u2019s a saying, \u2018Guns don\u2019t kill people, people do.\u2019 So it is with riskware<\/strong>. ‘Riskware doesn\u2019t hack people, people do.\u2019 Riskware is the name given to legitimate software that can be used for hacking purposes if it is exploited by malicious hackers. Basically, any software that can remotely use the machine, delete, block, disrupt networks or copy data could be a candidate for riskware.<\/p>\n

More specifically, the following types of programs have been hijacked by hackers to aid and abet theft , spying and intrusion.<\/p>\n