Cybersecurity Penetration Testing Subjective
May 20, 2013

What are Trojan Horse programs?

Detailed Explanation

Named after the wooden horse from Greek mythology, Trojan horses are non-replicating programs that appear to be benign but actually have a hidden malicious purpose. Some Trojan horses are intended to replace existing files with malicious versions, whereas other Trojan horses add another application to a system without overwriting existing files. Trojan horses are often difficult to detect because they appear to be performing a useful function.

Discussion (0)

No comments yet. Be the first to share your thoughts!

Share Your Thoughts
Feedback