Protect Your Computer Against the Trojan Horse

Protect Your Computer Against the Trojan Horse

Trojans come in many forms and can perform different actions on your computer or network: deleting data, copying data, modifying data, blocking data, disrupting computer networks or computers. Trojans are different from viruses and other type of malware because they can’t self-replicate.

Different Varieties Of Trojans That Are Classified By The Type Of Actions On Networks And Computers

  • Backdoor Trojans when installed on your computer or network give remote access control over to the malicious users. This enables the author of the Trojan to do anything he wishes with your computer. Backdoor Trojans are used to unite a group of infected computers to form a zombie or a botnet network that they control and use for criminal purposes.
  • Exploit Trojans will exploit the programs that contain certain codes or data to take advantage of the vulnerabilities within the program applications on your computer.
  • Rootkit Trojans will conceal certain activities and objectives on the infected computer or network. This prevents network operations or you from detecting and preventing the malicious program on your network or computer. The Trojan also extends the time the program can run on the infected device.
  • Trojan Banker will steal your account data and online banking information, credit card, debit card and e-payment information. Trojan DDoS this Trojan issues a denial of service attack against a web site or web address. The Trojan uses your computer to send multiple requests to the web site address that overwhelm the targeted address. This causes the web address to stop working because of the denial of service attack.
  • Trojan Downloader this Trojan downloads and installs the new version of the malware programs to your computer.
  • Trojan Dropper this type of Trojan is installed by hackers so they have access to your computer and can install the Trojans that prevent the detection of the malware on your computer.
  • Trojan FakeAV this Trojan fakes the activity of your anti-virus program. The Trojan extorts money from the person that is infected claiming they can remove the threat, but actually there is no threat to your computer.
  • Trojan Game Thief steals your account information from your online game accounts.
  • Trojan, IM will steal your login and password for your instant messenger, email accounts, Skype, and Yahoo Pager.
  • Trojan Ransom modifies the data on your computer when it is installed. Your computer will start experiencing problems and stop running correctly.
  • Trojan SMS will use your SMS account for sending text messages from your mobile device to premium rate phone numbers that cost you a lot of money when sent.
  • Trojan, Spy will spy on you and how you use your computer. They can track your data from the keystrokes on your keyboard.
  • Trojan Mailfinder will harvest all your email addresses from your email accounts.

How To Protect Yourself Against Trojans?

  1. You must remain diligent when working on the Internet or your email account. Trojans can infect your computer through roué websites, email attachments, and instant messaging. Never download programs you are uncertain about or download programs from a website you have never visited before.
  2. Always have the latest patches and security fixes installed on your computer. This is important if you are running any Microsoft programs or operating system.
  3. You should use paid anti-virus software for your computer. Free anti-virus software can protect your computer but they don’t offer the protection that paid software does. Always keep your antivirus software up to date with the latest virus detection.
  4. Having a firewall on your computer will help to control the viruses and Trojans on your computer. The firewall doesn’t guard against Trojans from entering into your operation system, but it will give you an added layer of protection when used with your antivirus software.

Image: flickr.com

More about: virus, malware, trojans, antivirus

Recommended Posts | Data Loss Prevention

Been Hacked

5 Essential Steps to Take After You've Been Hacked

If your PC or laptop has been hacked and infected with some kind of malware (like virus) you have to save your files from the process of being destroyed and, minimize the risk of your PC (or laptop) from being used to spread malware and potentially damage other computers ...
Apps For Preventing Permanent Data Loss

Useful Android Back Up Apps For Preventing Permanent Data Loss

Losing phone could be a significant challenge for anybody, particularly in this day and age where smartphones have turned into a crucial a piece of our lives. Much the same as with any machine, going down your versatile applications and information can demonstrate commendable when calamity strikes ...
Secure Your Data

Watchdox Is Here to Secure Your Data

Security and regulation become that much more important these days because there is a continuous increase in the data stored in the cloud which is being used by an increasing number of corporate systems and mobile devices. Watchdox, which specialises in the protection and sharing of enterprise ...
Data Loss Prevention

Data Loss Prevention Has Its Pitfalls

Data Loss Prevention or DLP is used to prevent information from leaking out or being lost. This strategy is commonly employed by companies to prevent sensitive data from being shared either by accident or with malicious intent. DLP is carried out by software that monitors data and blocks certain ...