C-Suite On Deck
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
I agree to the
terms of service
PLEASE CORRECT THE FOLLOWING:
Please Enter Some Keywords
Trojan Horse: Definition and How to Prevent this Virus
A Trojan horse is a type of malware often disguised as legitimate software. Unlike computer worms and viruses, Trojans are not able to self-replicate. Hackers and cyber-thieves who try to gain access to a user’s system use Trojans. Users fall for some form of social engineering and accidentally load and execute Trojans onto their systems. After the activation process, Trojans allow cybercriminals to spy on the users, steal their personal data, and gain backdoor access to their system. These actions can include: Blocking data. Deleting data. Copying data. Modifying data. Disrupting the performance of computer networks or computers. Types of Trojans. Some of the key Trojan varieties include: Trojan-Banker. This Trojan has been designed for stealing account data for online banking systems, debit and credit cards.
I'm for real
Enter your email once to access all our information and resources.
(Your email address is required so we know you're a real person)
By downloading this content, you give permission for your contact information to be shared with the content provider who may contact you in regards to the content.