The more connected we are with our tablets, mobiles, desktops, laptops, the more we are susceptible to an attack. The connected world boasts of different types of attacks. Some of them are viruses, worms, phishing emails, Trojans and so on. Malicious writers are constantly seeking new ways to exploit new vulnerabilities on new devices. We will explain the term Trojans in this post:
Similar to the fabled horse in the Trojan war (wherein the Trojan horse was used to stealthily get soldiers inside the enemy camp) – in computer security, a Trojan virus is a malware that disguises itself in everyday files. When an innocent user clicks on the file, the disguised Trojan virus with extraordinary capability is unleashed. Most common Trojan viruses are used to create back doors on systems, steal data from personal and business systems and remotely control a computer.
They do not replicate themselves but propagate by common social engineering techniques thereby duping the innocent user.