Trojan Horse

(redirected from Trojan horses)
Also found in: Dictionary, Thesaurus, Idioms, Encyclopedia.
Related to Trojan horses: Spyware, logic bomb

Trojan Horse

A computer virus that poses as an innocuous program. A Trojan horse appears to be harmless so that the user will install it, but then performs damaging activities like data theft or file deletion. The virus derives its name from the legendary wooden horse used by the Greeks to clandestinely gain access to Troy.
Mentioned in ?
References in periodicals archive ?
Some have stolen, data corrupted, strokes PC Ian After a highly-sensitive operation to locate where Trojan horse malware exists, Cleveland Police say the areas most affected on Teesside are: |Linthorpe in Middlesbrough, with 600 potential at-risk computers.
There are 17 variants of the RSPlug Trojan horse, and several variants of the iServices Trojan horse currently in the wild.
Some viruses and Trojan horse programs will erase or corrupt files on your hard drive, and a recent backup might be the only way to recover your data.
China's Trojan Horses provides detailed information--including maps, photos, and diagrams--on the operations and facilities of COSCO, OOCL, and other Red fronts at Long Beach, Los Angeles, Oakland, Seattle, Portland, New York-New Jersey, Charleston, Norfolk, Houston, Savannah, and New Orleans.
But currently, the big "industry" in Trojan Horses seems to consist mainly of installing secret programs which steal user identification and passwords from America On Line (AOL) users.
America Online, the giant on-line computer service, has no connection with the Trojan horse other than that its initials are used in the program's title.
Last week, Sophos experts of a malicious Chinese PowerPoint PPT file which contained exploit code that drops the keylogging Trojan horse onto users' computers.
According to the Sophos experts, the Tofger Trojan horses target users of a number of online banks, including Abbey, Barclays, Cahoot, HSBC, Lloyds, NatWest, Nationwide and Woolwich.
These threats combine the characteristics of viruses, worms, Trojan horses and/or malicious code with server and Internet vulnerabilities to initiate, transmit and spread an attack.
Founded in 2002, Avinti works with existing antivirus and e-mail security solutions in a layered security approach that eliminates Trojan horses, spyware, malware and other unknown e-mail threats from corporate e-mail systems.
It would be no surprise at all if more malware was written as the World Cup rapidly approaches," "Everyone should be careful not to fall foul of football-related viruses and Trojan horses, as well as football-related spam and lottery scams.
Two of the most dangerous forms of spyware, system monitors and Trojan horses, are appearing on enterprise networks at an alarming rate, according to the most recent Webroot Corporate SpyAudit, demonstrating the continued vulnerability of corporate systems to the escalating spyware threat.