Protect Your Computer Against the Trojan Horse

Protect Your Computer Against the Trojan Horse

Trojans come in many forms and can perform different actions on your computer or network: deleting data, copying data, modifying data, blocking data, disrupting computer networks or computers. Trojans are different from viruses and other type of malware because they can’t self-replicate.

Different Varieties Of Trojans That Are Classified By The Type Of Actions On Networks And Computers

  • Backdoor Trojans when installed on your computer or network give remote access control over to the malicious users. This enables the author of the Trojan to do anything he wishes with your computer. Backdoor Trojans are used to unite a group of infected computers to form a zombie or a botnet network that they control and use for criminal purposes.
  • Exploit Trojans will exploit the programs that contain certain codes or data to take advantage of the vulnerabilities within the program applications on your computer.
  • Rootkit Trojans will conceal certain activities and objectives on the infected computer or network. This prevents network operations or you from detecting and preventing the malicious program on your network or computer. The Trojan also extends the time the program can run on the infected device.
  • Trojan Banker will steal your account data and online banking information, credit card, debit card and e-payment information. Trojan DDoS this Trojan issues a denial of service attack against a web site or web address. The Trojan uses your computer to send multiple requests to the web site address that overwhelm the targeted address. This causes the web address to stop working because of the denial of service attack.
  • Trojan Downloader this Trojan downloads and installs the new version of the malware programs to your computer.
  • Trojan Dropper this type of Trojan is installed by hackers so they have access to your computer and can install the Trojans that prevent the detection of the malware on your computer.
  • Trojan FakeAV this Trojan fakes the activity of your anti-virus program. The Trojan extorts money from the person that is infected claiming they can remove the threat, but actually there is no threat to your computer.
  • Trojan Game Thief steals your account information from your online game accounts.
  • Trojan, IM will steal your login and password for your instant messenger, email accounts, Skype, and Yahoo Pager.
  • Trojan Ransom modifies the data on your computer when it is installed. Your computer will start experiencing problems and stop running correctly.
  • Trojan SMS will use your SMS account for sending text messages from your mobile device to premium rate phone numbers that cost you a lot of money when sent.
  • Trojan, Spy will spy on you and how you use your computer. They can track your data from the keystrokes on your keyboard.
  • Trojan Mailfinder will harvest all your email addresses from your email accounts.

How To Protect Yourself Against Trojans?

  1. You must remain diligent when working on the Internet or your email account. Trojans can infect your computer through roué websites, email attachments, and instant messaging. Never download programs you are uncertain about or download programs from a website you have never visited before.
  2. Always have the latest patches and security fixes installed on your computer. This is important if you are running any Microsoft programs or operating system.
  3. You should use paid anti-virus software for your computer. Free anti-virus software can protect your computer but they don’t offer the protection that paid software does. Always keep your antivirus software up to date with the latest virus detection.
  4. Having a firewall on your computer will help to control the viruses and Trojans on your computer. The firewall doesn’t guard against Trojans from entering into your operation system, but it will give you an added layer of protection when used with your antivirus software.

Image: flickr.com

More about: virus, malware, trojans, antivirus

Recommended Posts | Data Loss Prevention

Benefits of Tokenization for Data Security

What are the Benefits of Tokenization for Data Security?

After Apple released their new Apple Pay for secure mobile and online payments, tokenization has become a hot topic in data security. Tokenization was designed to prevent hackers from stealing customer’s data. New technology replaces real data with a token or fake data that has no use to a hacker ...
Save Your Data

Being Safe Is Not So Bad! Save Your Data

Data loss is never a fun experience. Especially in today's society. But what we as humans can do is try our best to prevent in in anyway possible. There are thousands of other methods to help safeguard data as well. Here are the things that I have done to create a sense of comfort ...
Emerging Security Threat Malvertising

Malvertising: An Emerging Security Threat

If you've disavowed yourself from suspicious email attachments and iffy websites, congratulations. You've taken one tiny step toward protecting yourself from malware. One Step! Unfortunately, protecting yourself from viruses and other security threats isn't as simple as knowing what not to click ...
Office 365

Office 365 Ready to Fight Data Loss

Information and data is available online and the biggest concern is data security. Office 365 is a subscription plan which consists of office utilities, exchange services, cloud applications, OneDrive and Skype for business. Office is ready to enter the second phase of its Data Loss Prevention plan ...