View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. What Is
July 1, 2016updated 22 Sep 2016 12:34pm

What is a Trojan?

This malicious software takes its name from the Trojan Horse used to attack Troy in the Ancient Greek story.

By Ellie Burns

In the context of computing, a Trojan horse is malicious software which is used to hack into a system or computer by misleading users of its true purpose – which is why its name takes after the wooden horse that helped Greek soldiers invade Troy in the Ancient Greek story.

Trojans are commonly spread via social engineering – like a user clicking on an email attachemt which looks legitimate – or by drive-by download. Trojans do not inject themselves into other files or propagate themselves, unlike viruses and worms.

Trojans have many uses. They can be used for destructive purposes, for example used to crash the computer or corrupt data, or they can be used for data theft, money theft or ransom, or used to infect a machine to be used as part of a botnet.

Trojans can even be used as part of industrial espionage and surveillance, with certain Trojans allowing keystroke logging, remote control of the system and accessing the user’s screen.

 

 

Content from our partners
Scan and deliver
GenAI cybersecurity: "A super-human analyst, with a brain the size of a planet."
Cloud, AI, and cyber security – highlights from DTX Manchester

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU