Yahoo India Web Search

Search results

  1. A Trojan horse virus is a type of malware that disguises itself within legitimate applications and software. Discover how Trojans work and how to prevent Trojan attacks and protect users from the latest spyware, threats, and viruses.

  2. Sep 19, 2023 · Trojan Horse : Trojan Horse is also a type of malware which uses false and fake name for mislead users from its true intent and executing them. Trojan Horses generally install on the system as legitimate and useful software that can give unauthorized access and control of the system to the hackers.

  3. A Trojan horse is a program that purports to perform some legitimate function, yet upon execution it compromises the user's security. A simple example is the following malicious version of the Linux sudo command.

  4. There are many different types of harmful Trojan horses. Learn about best-known Trojan horse viruses, and how you can protect yourself.

  5. Like its namesake, Trojan horse attacks (or simply “Trojans”) in computing are defined as a type of malware that use deception and social engineering to trick unsuspecting users into running seemingly benign computer programs that hide malicious ulterior motives.

  6. Jun 17, 2022 · A Trojan Horse (Trojan) is a type of malware that disguises itself as legitimate code. Attackers can export files, modify data, and delete files on your device.

  7. Dec 10, 2019 · In computing, a Trojan horse is a decoy that hides malware. Find out what a Trojan is and how to detect and protect against this sneaky type of attack.