Glossary

Trojan horse

A Trojan Horse, often referred to simply as a Trojan, is a type of malicious software that disguises itself as a legitimate or harmless program to deceive users into installing it on their systems.

Unlike viruses or worms, Trojans do not self-replicate but rely on social engineering techniques to spread. Once activated, a Trojan can perform a variety of malicious actions, such as stealing sensitive information, creating backdoors for unauthorised access, or enabling the download of additional malware. Trojans are often delivered via email attachments, malicious websites, or software downloads.

Key characteristics of Trojans include:

  • Disguising as legitimate software
  • Relying on user installation
  • Performing malicious actions like data theft and creating backdoors

Protecting against Trojans involves:

  • Using reliable antivirus software
  • Keeping systems and applications up to date
  • Exercising caution with email attachments and downloads from untrusted sources

Recognizing and mitigating Trojan threats is essential for maintaining cybersecurity and protecting sensitive data.

Glossary

Dive into Exclusive Networks' comprehensive Cybersecurity & IT Glossary.

Back to Glossary

Knowledge Base

Stay current with new ideas, reports and keep informed on the latest cybersecurity trends.

Knowledge Base

Start growing your business

Whether you need a quote, advice, want to become a partner, or want to take advantage of our global services, we are here to help.

Get in touch