Browse Definitions :

An explanation of Trojan horse

In this video, TechTarget editor Michaela Goss talks about the dangers of the Trojan horse virus and how to protect your business from it.

From Troy to your computer, beware the Trojan horse.

The term Trojan horse originates from Greek mythology, when -- in an attempt to infiltrate Troy -- Greek warriors hid inside a wooden horse disguised as a gift. A Trojan horse computer attack works in the same way -- an attacker sends innocent-looking emails that actually contain malware.

Here, we'll explain how to detect and prevent Trojan horse attacks.

Trojan horses are most commonly spread through email spamming. When a user clicks on an infected email attachment or download, malware is transferred to the device, enabling attackers to seize control. Once activated, Trojans can do the following:

  • Give an attacker backdoor control over the device.
  • Record keyboard strokes to steal sensitive user data.
  • Activate a device's camera and recording capabilities.
  • Turn the computer into a zombie computer to carry out fraud or illegal actions.
  • Or even be used by law enforcement to capture information relevant to a criminal investigation.

It's difficult for even advanced malware scanners to find and destroy Trojan horses, but they're typically accompanied by unusual behaviors like excessive popups, loss of keyboard and mouse control and unexpected changes in the computer's desktop, resolution, color and orientation.

As they say, prevention is the best medicine. The easiest way to prevent Trojans in the first place is by simply deleting emails and attachments from unknown senders. Other best practices include the following:

  • Investing in a security suite that includes both antivirus and antimalware software.
  • Updating operating systems as soon as possible.
  • Using unique and complicated passwords.
  • Using firewalls to protect personal information.
  • Avoiding all suspicious and unsafe websites.

Overall, you can never be too careful. Understanding the subtle signs of Trojan horses and their potential consequences is the first step in creating a secure digital environment.

Tommy Everson is an assistant editor for video content at TechTarget. He assists in content creation for TechTarget's YouTube channel and TikTok page.

Networking
  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

  • secure access service edge (SASE)

    Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native...

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between...

Security
  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or...

  • What is security information and event management (SIEM)?

    Security information and event management (SIEM) is an approach to security management that combines security information ...

CIO
  • product development (new product development)

    Product development -- also called new product management -- is a series of steps that includes the conceptualization, design, ...

  • innovation culture

    Innovation culture is the work environment that leaders cultivate to nurture unorthodox thinking and its application.

  • technology addiction

    Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video ...

HRSoftware
  • organizational network analysis (ONA)

    Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, ...

  • HireVue

    HireVue is an enterprise video interviewing technology provider of a platform that lets recruiters and hiring managers screen ...

  • Human Resource Certification Institute (HRCI)

    Human Resource Certification Institute (HRCI) is a U.S.-based credentialing organization offering certifications to HR ...

Customer Experience
  • contact center agent (call center agent)

    A contact center agent is a person who handles incoming or outgoing customer communications for an organization.

  • contact center management

    Contact center management is the process of overseeing contact center operations with the goal of providing an outstanding ...

  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

Close