Trojan Horse Malware
Greek Myth or
This is yet another form of tricking you into believing that some
program will be helpful to you, while actually doing exactly opposite - harmig your computer and even stealing your
personal info stored in your files. While trojans are not viruses, they often can behave
likecomputer viruses would do.
What is a Trojan Horse?
We have all heard the term Trojan Horse, but what exactly is it? A
Trojan Horse malware is a destructive program that masquerades as a harmless application. Unlike viruses,
Trojan Horses do not replicate themselves, but they can be just as destructive. One of the most dangerous examples
of a Trojan is a program that promises to rid your computer of viruses but instead introduces viruses into your
|Trojan horse malware programs can vary from a harmless nuissance, to (more
harmful malware usually hidden in another software or application.
The Trojan can be tricky. Who hasn’t been online and had an
advertisement pop up claiming to be able to rid your computer of some nasty virus? Or, even more frightening, you
receive an email that claims to be alerting you to a new virus that can threaten your computer. The sender promises
to quickly eradicate, or protect, your computer from viruses if you simply download their "free", attached software
into your computer. You may be skeptical but the software looks legitimate and the company sounds reputable. You
proceed to take them up on their offer and download the software. In doing so, you have just potentially exposed
yourself to a massive headache and your computer to a laundry list of ailments.
When a Trojan is activated, numerous things can happen. Some Trojans
are more annoying than malicious. Some of the less annoying Trojans may choose to change your desktop settings or
add silly desktop icons. The more serious Trojans can erase or overwrite data on your computer, corrupt files,
spread other malware such as viruses, spy on the user of a computer and secretly report data like browsing habits
to other people, log keystrokes to steal information such as passwords and credit card numbers, phish for bank
account details (which can be used for criminal activities), and even install a backdoor into your computer system
so that they can come and go as they please.
How to avoid encountering a Trojan
To increase your odds of not encountering a Trojan, follow these
Trojan horse gets the name from the old Greek Trojan War story how soldiers entered
Troy city hidden in a gifted wooden horse.
1. Remain diligent
Trojans can infect your computer through rogue websites, instant messaging, and
emails with attachments. Do not download anything into your computer unless you are 100 percent sure of its sender
Keep your operating system updated
Ensure that your operating system is always up-to-date. If you are running a
Microsoft Windows operating system, this is essential.
Install reliable anti-virus software
It is also important that you download any updates frequently to catch all new
Trojan Horses, viruses, and worms. Be sure that the anti-virus program that you choose can also scan e-mails and
files downloaded through the internet.
Consider installing a firewall
A firewall is a system that prevents unauthorized use and access to your computer.
A firewall is not going to eliminate your computer virus problems, but when used in conjunction with regular
operating system updates and reliable anti-virus software, it can provide additional security and protection for
Nothing can guarantee the security of your computer 100 percent. However, you can
continue to improve your computer's security and decrease the possibility of infection by consistently following
the above guidelines. And above all, if in doubt, leave out - you'll be surprised how often 'common sense' will