Yahoo India Web Search

Search results

  1. A Trojan horse virus is a type of malware that disguises itself within legitimate applications and software. Discover how Trojans work and how to prevent Trojan attacks and protect users from the latest spyware, threats, and viruses.

  2. Sep 19, 2023 · Trojan Horse : Trojan Horse is also a type of malware which uses false and fake name for mislead users from its true intent and executing them. Trojan Horses generally install on the system as legitimate and useful software that can give unauthorized access and control of the system to the hackers.

  3. In computing, a Trojan horse (or simply Trojan) is any malware that misleads users of its true intent by disguising itself as a standard program. The term is derived from the ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy .

  4. May 8, 2024 · Trojan horse, or Trojan, is a type of malicious code or software that can take control of your computer. It is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. Once installed, a Trojan can perform the action it was designed for.

  5. Like its namesake, Trojan horse attacks (or simply “Trojans”) in computing are defined as a type of malware that use deception and social engineering to trick unsuspecting users into running seemingly benign computer programs that hide malicious ulterior motives.

  6. A Trojan Horse (Trojan) is a type of malware that disguises itself as legitimate code. Attackers can export files, modify data, and delete files on your device.

  7. Jul 24, 2024 · What is a Trojan Horse? A Trojan horse, or Trojan for short, is a kind of virus that is disguised as a desirable piece of software. In this respect, Trojans do not self-replicate like viruses and worms but are different programs that are subversively installed in computers.

  8. Sep 2, 2024 · What is a Trojan Horse Attack? A Trojan Horse attack is a malware program that takes, in front of most of the targets, a mask of legitimate software so that users, in turn, install malware on their devices. Unlike worms or viruses, Trojans do not self-replicate.

  9. Jul 9, 2023 · There are trojans that can steal your passwords by monitoring keystrokes, lock files and set up ransom demands, use your computer as a ground zero for more cyberattacks and even hijack your instant messages and texts. Truly terrifying. So you’ve opened a trojan horse virus—now what?

  10. Sep 22, 2020 · Trojan Horse is also a type of malware which uses false and fake name for mislead users from its true intent and executing them. Trojan Horses generally install on the system as legitimate and useful software that can give unauthorized access and control of the system to the hackers.