By Scott Aurnou
In the security world, ‘Trojan’ is short for ‘Trojan horse.’ It’s a piece of hidden malicious software (aka ‘malware’) that – like the Trojan horse of Greek legend – isn’t what it appears to be.
Trojans are the majority of current malware, so it’s definitely wise to know where they can be found, what they can do and what you can do to protect your work network (and yourself) from them.
Among other places, Trojans can be lurking on infected websites or hidden in software downloads, email attachments, and mobile apps. They can hide inside nearly any type of file (audio, video, office documents, pictures, etc.) and will often be disguised as something fun, interesting or important, to tempt you to click on them.
Read more ›