By Robert Siciliano
One of history’s great literary classics is Homer’s Iliad, which tells the story of the Trojan horse—the wooden horse that the Greeks hid in to enter the city of Troy and take it over. Two thousand and some odd years later, hackers use a digital Trojan horse to hide malicious files in seemingly harmless files with the intent to attack or take over your device. A Trojan horse (or Trojan) is one of the most common and dangerous types of threats that can infect your computer or mobile device. Trojans are usually disguised as benign or useful software that you download from the Internet, but they actually carry malicious code designed to do harm—thus their name.
There are a variety of types of Trojans, many of which can launch sophisticated and clever attacks. Here are some types to be aware of:
Full Article with descriptions and advice
The City of Troy! Trojan War: http://en.wikipedia.org/wiki/Trojan_War Trojan Horse: http://en.wikipedia.org/wiki/Trojan_Horse Trojan horse (computing): http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29
Daniel ;)
Daniel ;)
Reply
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.