What is A Trojan Horse?
- One of history’s great literary is homer’s Iliad which tells the story of the Trojan horse.
- Two thousand and some odd years later hackers use a digital Trojan horse to hide malicious files in seemingly harmless files with the intent to attack or take over your device.
- A Trojan is one of the most common and dangerous types of threats that can infect your computer or mobile.
Variety of Trojan Horse
- Password-stealing Trojan: These look for saved passwords on your computer and email them to the hackers. Some can even steal passwords cacked in your browser history.
- Remote access Trojan: These are quite common allowing the attacker to take control of your computer and access all of your files. The hacker could potentially even access your online banking and credit card sites if you have your password stored in your browser memory or on your computer.
- Destructive Trojans: These Trojan destroy and delete files from your computer.
- Antivirus killers: These Trojan detect and kill your antivirus and firewall programs giving the attacker easier access to your computer.
Note: A Trojan can have one or multiple destructive uses, that is what makes them so dangerous. Its also important to realize that, unlike viruses, Trojans are not self-replicating and are only spread by users who mistakenly download them usually from an email attachment or by visiting an infected site.
Steps to avoid downloading a Trojan Horse
- Beware of suspicious emails: Don’t open an email attachment if you don’t recognize the sender of the email.
- Separate the good from the bad: Use an email program with a built-in spam filter to decrease the chance of a malicious email getting into your inbox.
- Know the threats: Keep current on the latest threats so you know what to look for when you receive suspicious emails.
Notes: Trojan are common because they are so successful. Hackers use social engineering techniques, such as mentioning a current news topic or popular celebrity, to get you to click on their email. Just being aware of what they are and how they work can prevent you from having to deal with financial loss identity theft damage to your computer and significant downtime.