Cyber Security FAQ Part -2

May 31, 2020

Cyber Security FAQs

Q1. What is a Trojan virus?

A Trojan is effectively a program that pretends to be legitimate software — but, when launched, it will perform a harmful action. Unlike computer viruses and worms, Trojans cannot spread by themselves. Typically, Trojans are installed secretly and they deliver their malicious payload without the user’s knowledge. Cybercriminals use many different types of Trojans — and each has been designed to perform a specific malicious function.The most common are:

  • Backdoor Trojans (these often include a keylogger)
  • Trojan Spies
  • Password stealing Trojans
  • Trojan Proxies

— that convert your computer into a spam distribution machine

Q2. Why are Trojan viruses called Trojans?

In Greek mythology — during the Trojan war — the Greeks used subterfuge to enter the city of Troy. The Greeks constructed a massive wooden horse — and, unaware that the horse contained Greek soldiers, the Trojans pulled the horse into the city. At night, the Greek soldiers escaped from the horse and opened the city gates — for the Greek army to enter Troy. Today, Trojan viruses use subterfuge to enter unsuspecting users’ computers and devices.

Q3. What is a Keylogger?

A keylogger is a program that can record what you type on your computer keyboard. Criminals use keyloggers to obtain confidential data — such as login details, passwords, credit card numbers, PINs and other items. Backdoor Trojans typically include an integrated keylogger.

Total Page Visits: 140 - Today Page Visits: 2

Leave a Reply

Your email address will not be published. Required fields are marked *