Search results
A Trojan Horse (Trojan) is a type of malware that disguises itself as legitimate code. Attackers can export files, modify data, and delete files on your device.
8 maj 2024 · Trojan horse, or Trojan, is a type of malicious code or software that can take control of your computer. It is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. Once installed, a Trojan can perform the action it was designed for.
2 wrz 2024 · A Trojan Horse attack is a malware program that takes, in front of most of the targets, a mask of legitimate software so that users, in turn, install malware on their devices. Unlike worms or viruses, Trojans do not self-replicate.
There are many different types of harmful Trojan horses. Learn about best-known Trojan horse viruses, and how you can protect yourself.
Like its namesake, Trojan horse attacks (or simply “Trojans”) in computing are defined as a type of malware that use deception and social engineering to trick unsuspecting users into running seemingly benign computer programs that hide malicious ulterior motives.
Discover what a Trojan horse is in computing and how hackers use it to surreptitiously sneak malicious files into organizations and users' devices.