About Cyber Security - Trojan Horse
What is Trojan Horse?
A trojan horse is a form of malicious program or software that looks legitimate but can be dangerous enough to hijack your device. A Trojan Horse can damage, disrupt, steal, and even harm your data or network. A Trojan represents itself as a legit request or file to trick you. It will try to control your device to load and run. The term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.
How dangerous is a Trojan?
Distributed Denial of Service (DDoS) Trojan
DDoS attacks aim to flood a network or website with traffic to overwhelm it. They recruit your computer into their army of infected devices, then use it to carry out a DDoS attack on its intended target.
These Trojans download new versions of malware to your computer on their own.
Info stealer Trojan
Info stealer collects information, such as contact details, usernames, and passwords, and uploads them to a remote server.
Remote Access Trojan (RAT)
RATs are a type of “backdoor” to your device that allows hackers to do pretty much whatever they like, including sending, receiving, or deleting files.
The Mailfinder Trojan collects and steals all of the email addresses on your device.
How to prevent Trojan Horse?
Your computer may be infected with a Trojan if the computer starts acting unusual after installing new software. The new program needs to be uninstalled to remove it from the system. Because certain trojans don’t display on the program list, suspicious software should be checked in the computer’s registry database.
Ways To Prevent Trojan Horse
Here are someway to prevent Trojan Horse:
1. Be careful when downloading
You should never fully trust the download or installation of software from the websites.
2. Be alert of threats of phishing
Never open an appendix, click a link, or execute a program that you don’t know about in an email.
3. Don’t ignore software updates
Be sure to keep your system’s software up-to-date. Software updates usually provide important patches that tighten up your security.
4. Back up regularly
While backing up your files won’t protect you from downloading a Trojan, it will help you recover files you might lose during an attack.
5. Be careful what you download
Only download programs from publishers you know you can trust, no matter how intriguing their offer.
6. Avoid clicking on pop-ups or banners
Do not click on the unknown, unreliable pop-ups that warn you that your device is infected or that it offers a miracle solution. This is a common tactic of a trojan horse.
Trojan horse is very dangerous, it is important to protect your computer. Just as with protection against common threats to cybersecurity, effective security software should be your main safeguard. You should always use an effective anti-virus that quickly warns you when a Trojan horse is found on your device.
Need help with preventing Cyber Security ?
Call us at +65 6262 0402 or email us at email@example.com to get the information details on your needs.