FAQ

Cyber Security FAQ Part -2

Cyber Security FAQ Part -2

Q 1)What is a Trojan virus?

A Trojan is effectively a program that pretends to be legitimate software — but, when launched, it will perform a harmful action. Unlike computer viruses and worms, Trojans cannot spread by themselves. Typically, Trojans are installed secretly and they deliver their malicious payload without the user’s knowledge. Cybercriminals use many different types of Trojans — and each has been designed to perform a specific malicious function.The most common are: Backdoor Trojans (these often include a keylogger) Trojan Spies Password stealing Trojans Trojan Proxies — that convert your computer into a spam distribution machine

Q 2)Why are Trojan viruses called Trojans?

In Greek mythology — during the Trojan war — the Greeks used subterfuge to enter the city of Troy. The Greeks constructed a massive wooden horse — and, unaware that the horse contained Greek soldiers, the Trojans pulled the horse into the city. At night, the Greek soldiers escaped from the horse and opened the city gates — for the Greek army to enter Troy. Today, Trojan viruses use subterfuge to enter unsuspecting users’ computers and devices.

Q 3)What is a Keylogger?

A keylogger is a program that can record what you type on your computer keyboard. Criminals use keyloggers to obtain confidential data — such as login details, passwords, credit card numbers, PINs and other items. Backdoor Trojans typically include an integrated keylogger.