Trojan horse (computing)

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
For the original from Greek mythology, see Trojan Horse.
Trojan horse

A trojan horse (often just called trojan) is a kind of software that is used for malicious purposes. [1] A trojan horse is a special type of malware that pretends to do a certain thing, but in reality it does something else, such as allow a stranger to access the computer and change it and read its information. In some cases the user notices, in other cases they do not. Spyware programs are examples of programs that work as trojans.

Trojans are generally spread by some form of trickery, for example inducing users to click on bad popups, Email, text, attachments, advertisements, or phony device driver updates. A trojan may act as a "backdoor" to the computer, contacting a controller which can then have unauthorized access to the affected computer. Trojans may also access users' personal information such as banking information, passwords, or personal identity (IP address). It can infect other devices connected to the network. Ransomware attacks are often carried out using a Trojan.

It is rare to get a trojan on your computer by merely visiting a website, though it can happen. Usually, though, trojans are attached to something the user downloads, such as music, wallpapers, backgrounds, games, and especially executable files (.exe).

Trojans were named after the Trojan Horse in Greek mythology, given as a gift but with hidden destructive ability once the user lets it enter.

References[change | change source]

  1. "Definition of TROJAN HORSE". Retrieved 2020-08-19.