Overview
Named after the ancient Greek story, a Trojan horse tricks users into installing it by appearing to be a useful program, such as a free game, utility, or software update. Once installed, it can perform malicious actions in the background.
Capabilities
- Stealing passwords and personal data.
- Installing other malware (e.g., ransomware or rootkits).
- Creating a 'backdoor' for remote access.
- Deleting or corrupting files.
Prevention
- Only download software from trusted sources.
- Use up-to-date antivirus software.
- Be cautious of unsolicited email attachments and links.