malware<\/a> or malicious computer program that misleads users of its true intent. Trojans generally require some form of social engineering in order to spread. An example could be a user tricked into executing an email attachment disguised to appear not suspicious or a fake ad on a website.<\/p>\n\n\n\nThe payload is not specific and therefore can be anything. In most cases, they are used as backdoors allowing a bad actor to have unauthorized access to a computer network.<\/p>\n\n\n\n
The term for this type of malware is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.<\/p>\n","protected":false},"excerpt":{"rendered":"
A Trojan horse in computing is is a piece of malware or malicious computer program that misleads users of its true intent. Trojans generally require some form of social engineering…<\/p>\n","protected":false},"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"glossary-index":[689],"yoast_head":"\n
Trojan Horse Definition - Brightwhiz.com<\/title>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\t\n