Definition
A Trojan Horse is malware disguised as legitimate software that tricks users into installing it, then provides attackers with unauthorized access to the victim's system for data theft, surveillance, or further attacks.
Frequently Asked Questions
Related Terms
Malware
Malware (malicious software) is any software intentionally designed to cause damage to a computer, server, client, or network. Common types include viruses, worms, trojans, ransomware, spyware, adware, and rootkits.
Social Engineering
Social engineering is a manipulation technique that exploits human psychology to trick people into making security mistakes or giving away sensitive information. It is the human element of cybersecurity attacks and often serves as the initial vector for more complex attacks.
Rootkit
A Rootkit is a collection of malicious software tools that provides privileged access to a computer while actively concealing its presence from users, administrators, and security software.
Related Services
Need Help With Trojan Horse?
Our certified security professionals can help you implement the right trojan horse strategy for your organization. Get a free assessment today.
Book a Free Consultation