Overview

Named after the ancient Greek story, a Trojan horse tricks users into installing it by appearing to be a useful program, such as a free game, utility, or software update. Once installed, it can perform malicious actions in the background.

Capabilities

  • Stealing passwords and personal data.
  • Installing other malware (e.g., ransomware or rootkits).
  • Creating a 'backdoor' for remote access.
  • Deleting or corrupting files.

Prevention

  • Only download software from trusted sources.
  • Use up-to-date antivirus software.
  • Be cautious of unsolicited email attachments and links.

Related Terms