What is the name of an executable program that appears as a desirable or useful program

Suggest a new Definition

Proposed definitions will be considered for inclusion in the Economictimes.com


Definition: Trojan or Trojan horse is the name given to a computer virus. It is a type of computer software that is camouflaged in the form of regular software such as utilities, games and sometimes even antivirus programs. Once it runs on the computer, it causes problems like killing background system processes, deleting hard drive data and corrupting file allocation systems.

Description: Mostly Trojans are introduced via email attachments. These emails are disguised in a way that they look authentic. Once the user downloads the attached file and runs it, the file starts corrupting the system. A Trojan can also come as a payload with freeware and shareware available on the Internet. Although every freeware doesn't come with Trojan, it is still advised that one should download software and freeware from authentic sources only. It is also imperative that you be very careful while making the selections at the time of installation. Trojans can have multiple usages, which depend on the motives of the attacker. These could be identity theft, data theft, crashing computers, spying or tracking user activities. Generally, Trojans are identified by most anti-virus software and do not harm the computer unless they are executed. Also, they do not replicate but can come attached to a virus which can spread to other computers across the network. Installing a good and licensed anti-virus software, keeping virus definitions of computers up-to-date, being cautious while opening email attachments even if it looks authentic and paying attention towards system security popup messages are some of the ways by which you can keep a computer safe and secure. Trivia: The term Trojan horse comes from the Greek-Trojan war, in which Greeks infiltrated the city of Troy by sending soldiers covertly inside a huge wooden horse as a gift to the Trojan King.

  • PREV DEFINITION

Related News

  • Trojan posing as IT refund skulking to attack Android phone bank customersThe phishing (a social engineering computer virus attack to steal personal data) malware is masquerading as an "income tax refund" and it can "effectively jeopardise the privacy of sensitive customer data and result in large-scale attacks and financial frauds", the CERT-In advisory issued on Tuesday said.
  • Trojan posing as IT refund skulking to attack Android phone bank customersThe phishing (a social engineering computer virus attack to steal personal data) malware is masquerading as an "income tax refund" and it can "effectively jeopardise the privacy of sensitive customer data and result in large-scale attacks and financial frauds", the CERT-In advisory issued on Tuesday said.
  • Pegasus leak: Playing horsey & the emergencyAccording to an investigative consortium comprising organisations like Amnesty International, over 50,000 high-profile individuals the world over have been targeted for clandestine surveillance through the use of Pegasus.
  • To knock out a mocking mosquito: What Florida thinks today, India can swat tomorrowAmerica is releasing mosquitoes to disarm mosquitoes.
  • To knock out a mocking mosquito: What Florida thinks today, India can swat tomorrowAmerica is releasing mosquitoes to disarm mosquitoes.
  • Attempts were made to disrupt power supply, says Nitin Raut​​Raut just said the Centre had warned there were attempts to disrupt power supply but they were not successful. Raut said after the blackout, he had asked the cyber cell to investigate the causes and it had given its report.
  • Over 5% more malicious files detected every day in 2020: KasperskyThe growth was driven mostly by the number of Trojans -- malicious files capable of a range of actions, including deleting data and spying -- and backdoors, a specific type of Trojan that gives attackers remote control over the infected device, Kaspersky said in its 'Security Bulletin: Statistics of the Year Report'.
  • Android malware 'BlackRock' prowling in cyber space, may steal banking data: AdvisoryThe "noteworthy feature" of this malware is that its target list contains 337 applications including banking and financial applications, and also non-financial and well-known commonly used brand name apps on an Android device that focus on social, communication, networking and dating platforms, it said.
  • Chennai records highest number of cyberattacks in India in Q4: K7 ComputingAmong Tier-I cities, Chennai, Bengaluru, Hyderabad and Kolkata recorded the highest rate of infections, while among the Tier-II cities, Patna registered the highest infection rate at 38% followed by Guwahati, Jammu and Bhubaneswar.
  • Mobile banking malware that hides in MS Word, Adobe flash apps may affect Android smartphonesIt has been observed that a new Android mobile malware named EventBot is spreading.

What malware looks like a useful or desired executable program but is in reality program that is supposed to cause harm?

A Trojan horse is designed to appear as a legitimate software program to gain access to a system. Once activated following installation, Trojans can execute their malicious functions. Spyware collects information and data on the device and user, as well as observes the user's activity without their knowledge.

What malware looks like a useful or desired executable program but is in reality a program that is supposed to cause harm to your computer or steal information from?

In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious.

What do you mean by Trojan?

Definition: Trojan or Trojan horse is the name given to a computer virus. It is a type of computer software that is camouflaged in the form of regular software such as utilities, games and sometimes even antivirus programs.

What is Trojan horse and backdoor?

Backdoor malware is commonly referred to as a Trojan. A Trojan horse is a malicious computer software that masquerades as something it isn't in order to spread malware, steal data, or open a backdoor on your system. Computer Trojans, like the Trojan horse from Greek mythology, usually come with a terrible surprise.

Toplist

Neuester Beitrag

Stichworte