Torjan Horse: I n Computing, a Torjan Horse is a program that appears harmless but is in fact malicious. Torjan horse contains the malicious code when triggered causes the loss or the theft of data. Unlike the virus, it is not able to replicate itself nor it can propagate without an end user assistance. This is why attacker must use social engineering tactics to trick the end user into executing the Torjan. Typically, malware programming is hidden into the innocent looking email attachment or free download. when user clicks on the email attachment or download the free program the malware that is hidden is transferred into the users computing device and carry out the task as designed by the attacker. some of them are : Bitfrost , Tiny Banker ,Fake AV Trojan, Magic Lantern ,Zeus. Computer Virus: C omputer Virus is a malicious code that replicate by copying itself to another program , computer boot sector or documents and change how a computer works. It ...
Comments
Post a Comment