Call us 24/7 and get a free diagnosis
Hello!
You’re about to visit our web page in Español
Would you like to continue?
If this is not what you’re looking for,
Call us 24/7 and get a free diagnosis
A Trojan horse or Trojan is a type of malware that is often disguised as safe, legitimate software. Once run, Trojans enable cybercriminals to access infected computers remotely.
A Trojan is a type of virus that can have highly destructive effects: from deleting files to destroying all the contents of the hard disk. Trojans can also capture and resend confidential data to an external address or open communication ports, allowing an intruder to control the infected computer remotely.
Additionally, they can capture keystrokes or record the passwords entered by users. Given all these characteristics, they are frequently used by cybercrooks to steal confidential banking information.
The main objective of this type of malware is to install other applications on the infected computer, so it can be controlled from other computers.
Trojans do not spread by themselves, and as their name suggests, like the astute Greeks in their attack on Troy, these malicious codes reach computers in the guise of an apparently harmless program, which, in many cases, when executed releases a second program, the Trojan itself. This is the typical behavior of downloader Trojans.
Every day, the AV-TEST Institute registers over 350,000 new malicious programs (malware). This includes banking Trojans, whose global impact has increased by 50 percent over the last four months.
The effects of Trojans can be highly dangerous. Like viruses, they can destroy files or information on hard disks. They can also capture and resend confidential data to an external address or open communication ports, allowing an intruder to control the infected computer remotely.
To protect yourself against this ubiquitous type of malware, we offer a series of practical tips: