Trojans

trojans A trojan horse malware is a type of software than deploys malicious code after installation of a host program. It could be a small freeware application that actually works, and may work well and be a great alternative to an expensive software. However, inside the working freeware is a trojan which deploys during install of the host application, and then does the dirty work.
Our Top Quick Recommendation:
StopZilla - Download and scan now
to get fixed up right away. Free download and scan with this award winning software.

The term comes from a Greek tale of an attacking Greek army building a great wooden horse. They pretended to leave the war and left the wheeled horse. The horse was wheeled into the Trojan camp as a sign of victory, but unknowingly housed many Greek elite soldiers. These troops emerged from the horse and attacked the surprised and vulnerable enemy. Today, the horse is typically some kind of software the user is happy to receive. After installing the software, the payload executes, much like the attacking Greek army. Thus, the trojan horse is now a common problem on today's PCs.

These trojans are particularly difficult to curtail, due to many users' insistence to blindly install freeware. Users have to make a determined effort to scan and check all software before installing it.

We recommend using a capable trojan scanner and remover regularly, and in particular, scanning software before installing it. These scanners can even run normally on your PC to alert you of any trojans before installing downloaded files. If you suspect you have a trojan on your computer, get started with our step-by-step spyware remover software guide right away.

Trojan News

Scary new malware uses a Gmail trick to steal your data A new piece of malware that can spy on a user’s computer has been discovered, Wired reports, with researchers also having found a clever way for the program to communicate with its creators: Google’s popular Gmail email service. FROM EARLIER: You can force your way into Google’s Inbox even without an invite Security startup Shape Security says it found a new strain of malware that’s able to read ...

Malware attacks on Android users up 600% - Kaspersky More than 588,000 Android users worldwide were attacked by financial malware between August 2013 and July 2014, six times the amount from the previous 12-month period.

Hackers Are Using Gmail Drafts to Update Their Malware and Steal Data In his career-ending extramarital affair that came to light in 2012, General David Petraeus used a stealthy technique to communicate with his lover Paula Broadwell: the pair left messages for each other in the drafts folder of a shared Gmail account. Now hackers have learned the same trick. Only instead of a mistress, they're sharing their love letters with data-stealing malware buried deep on a ...