Trojan Horse


Also found in: Dictionary, Thesaurus, Medical, Acronyms, Idioms, Encyclopedia, Wikipedia.
Related to Trojan Horse: Trojan War

Trojan Horse

A computer virus that poses as an innocuous program. A Trojan horse appears to be harmless so that the user will install it, but then performs damaging activities like data theft or file deletion. The virus derives its name from the legendary wooden horse used by the Greeks to clandestinely gain access to Troy.
Mentioned in ?
References in periodicals archive ?
The authority highlighted the conclusions of Mr Kershaw's report, which said: "My investigation has found that elements of the five steps referred to in the Trojan Horse Letter are present in a large number of the schools considered as part of the investigation.
Not only does it only scan files from a handful of applications, and only for two Trojan horses, but it didn't even spot all the current variants that we tested.
As a metaphor, however, the Trojan Horse imagery works effectively.
Now, a study in rats indicates that AZT may have another Trojan horse in its army: The drug also appears to substitute for uridine, another component of the cell's genetic machinery.
The Trojan Horse Exercise running along side the Maritime Homeland Security Summit's Security Training and Live Exercise Focus Day will take place on Monday, April 11th.
Education Secretary Justine Greening said the Trojan Horse affair, when teachers and others attempted to introduce an "intolerant" religious ethos into Birmingham schools, was "a shocking wakeup call".
The so-called Trojan Horse plot, which came to light in 2014, centred on an alleged move by a small group of hardline Muslims to seize control of a small number of Birmingham schools.
However, it is understood there is no specic reference to one of the most controversial allegations in the Trojan Horse letter, stating that a radical preacher had spoken at a pupils' assembly.
A new variant of the RSPIug Trojan horse has been found on several pornographic web sites.
SCR which will install Trojan horse banking spyware.
Some members of the Apple Macintosh community have claimed that Leap-A is a Trojan horse, and not a virus or worm, because it requires user interaction (the user has to receive a file via iChat, and manually choose to open and run the file contained inside).
Details of a Trojan horse being sent out to e-mail addresses under the guise of a warning about a university rapist have been issued by SophosLabs, the Sophos network of virus, spyware and spam analysis centres.