What Is Trojan Horse :-
Trojan Horse or Trojan is a type of malicious software which is designed to hack into the computer by misleading the user . Trojan Horses are designed by inspiring to the Greek's story of wooden horses . According to story Greekies weremade the large number of trojan horses in which Greeky soldiers hide themselves and they were enter into the gate to get their fellows similar developor design the trojans by attachment of malicious programs through a mail , through drive by download , through spam links or through fake pop ups and advertisment . If once trojan attacked on your computer then attacker can hack your personal data which saved on your computer .
Types Of Trojans :-
Exploit Trojans :-
These types of trojans are basically a application that comprises with security vulnerabilities of software and operating systems of our computer which has already installed on our computer for malicious intent .
Related Articles :-
What Is Adware ? Different Types Of Adware .
What Is Rootkit ? Different Types Of Rootkits .What Is Ransomware ?
Different Types Of Ransomware .
What Is Scareware ? Effects Of Scareware .
Backdoor :-
Backdoor is most common and dangerous trojans these trojans are also known as Remote Access Trojans ( RATs ). These trojans are almost invisible to the user and once if these entered in the system then attacker or intruder would be able to remote access to the system. Backdoor Trojans have abilities to collect information, terminate or run a task or process, download and upload files, reports to the attacker's machine, change critical setting in Windows, shutdown or restart the PC, and perform Denial of Service (DoS) attacks.
Daniel Of Service ( DoS ) Atack Trojans :-
Daniel Of Service Attack Trojans are sub part of backdoor Trojans, denial of service (DoS) attacks are made from numerous computers and cause the failure of web address .
Password Stealing Trojans :-
Password stealing Trojans are work to steal passwords by copying cached or newly entered passwords in the computer or while the user browses or uses any application that requires a password. The copy f passwords is sent via email which is delivered to attacker's email account.Banker Trojans :-
These type of trojans are created by some bankers for the stole the information related to users bank, credit card, debit card and e-payment .
FakeAV :-
These types of Trojans used to convienence users that their computers are infected with numerous viruses and other threats in an attempt to extort money. Often, the threats aren’t real, and the FakeAV program itself will be what is causing problems in the first place.
Key logging Trojans : -
Keylogger Trojans are created to record every mouse click or pressed keys of an infected computer. The action that recorded by these Trojans from the computer is sent to a remote location. Spyware distributors and hackers are the common attackers of keyloggers to gain information that they need e.g. online banking credentials, email account username and passwords, and credit card or other valuable data.
System file killing Trojans : -
These type of Trojans often end or shutdown important system or program files. An example of this Trojan is the Trojan.KillAV.
Ransom: Trojans :-
Ransoms Trojans modify or block data on a computer either so it doesn’t work properly or so certain files can’t be accessed. The person disrupting the computer will restore the computer or files only after a user has paid a ransom. Data blocked this way is often impossible to recover without the criminal’s approval.
Related Articles :-
What Is Computer Virus ? Different Types Of Computer Virus .
What Is Trojan Horse ? Types Of Trojan Horse .
What Is Computer Worm ? Different Types Of Computer Worms .
What Is Spyware ? Types Of Spyware and Effects Of Spyware .
Downloader : -
These are programmed to download and install new malicious programs onto a computer, which usually includes Trojans, spyware, adware and/or viruses.<)p>
How To Stay Protected From Trojans :-
To stay completely protected from trojans you must take care of following things :-
On our computer here provided for us an Internet security suite. Run periodic diagnostic scans with your software. You can set it up so the program runs scans automatically during regular intervals.
Update your operating system’s software as soon as the updates are available from the software company. These groups tend to exploit security holes in outdated software programs. In addition to operating system updates, you should also check for updates on other software that you use on your computer as well.
Don’t visit unsafe websites. Most Internet security suites include a component alerting you that the site you’re about to visit is unsafe.
Don’t download attachments or click on links in unfamiliar emails.
Protect accounts with complex, unique passwords.
Finally, you should always keep your personal information safe with firewalls
Add your comment Hide comment