What Is Trojan

In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive wooden horse that led to the fall of the city of Troy. Unlike computer viruses and worms, Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves.
Trojan in this way may require interaction with a malicious controller (not necessarily distributing the Trojan) to fulfill their purpose. It is possible for those involved with Trojans to scan computers on a network to locate any with a Trojan installed, which the hacker can then control.
Some Trojans take advantage of a security flaw in older versions of Internet Explorer and Google Chrome to use the host computer as an anonymizer proxy to effectively hide Internet usage, enabling the controller to use the Internet for illegal purposes while all potentially incriminating evidence indicates the infected computer or its IP address.

How Trojan Spreads

Trojans are generally spread by some form of social engineering, for example where a user is duped into executing an e-mail attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by drive-by download. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller which can then have unauthorized access to the affected computer. Trojans may allow an attacker to access users' personal information such as banking information, passwords, or personal identity (IP address). It can infect other devices connected to the network. Ransomware attacks are often carried out using a Trojan.

Famous Trojan Viruses

Code Red.
Melissa
Sasser
Zeus
Conficker
Stuxnet
ILOVEYOU
Mydoom

How to avoid Trojan

Step I
Never open unsolicited emails from unknown senders. Emails from people you don't know may contain links, attachments or other traps that can get you to inadvertently install Trojans.
Step II
Avoid downloading and installing programs unless you fully trust the publisher. Some websites attempt to trick users into downloading programs that they claim will perform useful tasks, when in reality installation will only infect your computer.
Step III
Use firewall software. Firewalls are programs that can block unsolicited connections, which may help prevent Trojans. If you use Windows XP Service Pack 2 or later, Vista or Windows 7, you will have access to Windows Firewall. Make sure it is running properly.
Step IV
Use a fully updated antivirus program whenever you are using the Internet. Antivirus software can help scan links for malicious data and prevent and remove malware, like Trojans.



Thursday, December 07, 2017 19:40:43 PM UNARRANGEMENT PERMALINK COM(0) TB(0)

COMMENT FORM

Please post a comment from the form below

TRACKBACK

TRACKBACK URL