It is a variety of malware that is often disguised as legitimate software. The hackers and the cybercriminals employ trojans that are attempting to receive access to your system. In this method, typically the users are tricked by some form of social engineering for loading and executing the trojan files on their system. Once they are activated, the trojan can enable all the cyber criminals to spy on you, gain backdoor access to your system, steal your data and manipulate your files.
« Back to Glossary IndexTrojan
« Back to Glossary Index