TL; DR: A backdoor in software or a computer system is generally an undocumented portal that allows an administrator to enter the system to troubleshoot or do upkeep.
Often, the backdoor's existence is unknown to the system owner and is known only to the software maker.
Built-in administrative backdoors create a vulnerability in the software or system that intruders can use to gain access to a system or data.
Attackers also can install their own backdoor on a targeted system.
Doing so allows them to come and go as they please and gives them remote access to the system.
Malware installed on systems for this purpose is often called a remote access Trojan, or a RAT, and can be used to install other malware on the system or exfiltrate data.
Backdoors of another sort gained notoriety in 2013 when NSA documents leaked to the media by whistleblower Edward Snowden revealed a decades-long effort by the spy agency, in partnership with Britain's GCHQ, to pressure companies into installing backdoors in their products.They particularly focused pressure on the makers of encryption systems.These secret backdoors allow the intelligence agencies to circumvent or undermine security protections and surreptitiously access systems and data.One of the most controversial backdoor cases involved the NSA's reported efforts to intentionally weaken an encryption algorithm known as the NIST SP800-90 Dual Ec Prng so that any data encrypted with the algorithm would be susceptible to cracking by the NSA.Just hours after proof-of-concept code was tweeted, security researchers have revealed the long-awaited details of two vulnerabilities in Intel processors dating back more than two decades.Two critical vulnerabilities found in Intel chips can let an attacker steal data from the memory of running apps, such as data from password managers, browsers, emails, and photos and documents.Tags: Adult Dating, affair dating, sex dating