A trojan horse malware is a type of software than deploys malicious code after installation of a host program. It could be a small freeware application that actually works, and may work well and be a great alternative to an expensive software. However, inside the working freeware is a trojan which deploys during install of the host application, and then does the dirty work.
Our Top Quick Recommendation:
StopZilla - Download and scan now to get fixed up right away. Free download and scan with this award winning software.
The term comes from a Greek tale of an attacking Greek army building a great wooden horse. They pretended to leave the war and left the wheeled horse. The horse was wheeled into the Trojan camp as a sign of victory, but unknowingly housed many Greek elite soldiers. These troops emerged from the horse and attacked the surprised and vulnerable enemy. Today, the horse is typically some kind of software the user is happy to receive. After installing the software, the payload executes, much like the attacking Greek army. Thus, the trojan horse is now a common problem on today's PCs.
These trojans are particularly difficult to curtail, due to many users' insistence to blindly install freeware. Users have to make a determined effort to scan and check all software before installing it.
We recommend using a capable trojan scanner and remover regularly, and in particular, scanning software before installing it. These scanners can even run normally on your PC to alert you of any trojans before installing downloaded files. If you suspect you have a trojan on your computer, get started with our step-by-step spyware remover software guide right away.
Porn-based malware on Facebook infects thousands of accounts in two days London, Feb 01 (ANI): A porn-based malware on Facebook is believed to have affected over 1,10,000 accounts in the past two days that dupes users into clicking on an adult link that infects their computers with a Trojan to hijack vital parts. According to Daily Star, the link once clicked, asks users to download the latest Flash Player update to view it.
Banking Trojans Disguised As ICS/SCADA Software Infecting Plants Researcher spots spike in traditional financial malware hitting ICS/SCADA networks -- posing as popular GE, Siemens, and Advantech HMI products.
Source code for Android iBanking bot surfaces on underground forum The source code for an Android mobile banking Trojan app was released on an underground forum, making it possible for a larger number of cybercriminals to launch attacks using this kind of malware in the future. The Trojan app had initially appeared on the underground market late last year with a price of US$5,000, according to researchers from RSA, the security division of EMC, who spotted the ...