Trojan horse

New Banking Trojan Horses Gain Polish

Criminals today can hijack active online banking sessions, and new Trojan horses can fake the account balance to prevent victims from seeing that they're being defrauded. Traditionally, such malware stole usernames and passwords for specific banks; but the criminal had to access the compromised account manually to withdraw funds. To stop those attacks, financial services developed authentication methods such as device ID, geolocation, and challenging questions. Unfortunately, criminals facing those obstacles have gotten smarter, too.
U.S.

Online game disguised as Space Invaders hits Mac users with trojan

Mac users have been warned of a new threat cleverly disguised as a classic video game.

Symantec's senior information developer Ben Nahorney claimed that the trojan downloaded, detected as Trojan.Loosemaque, is designed to look like a Space Invaders/Galaga style game. However, for every alien ship the user destroys, the program deletes a file from the home directory.

International

What is a “Trojan Horse” program?

Like the Greek myth, a Trojan horse is a malware program hiding inside another program that does something useful.  This could be a freeware program, like an MP3 encoder, a tool for breaking DVD copy protection or a game.  Whatever it is, when you install it on your system it also installs a “payload”—one or more malware programs such as a keylogger or a backdoor.  (See also, What is spyware and malware?)
International

What is a “Trojan Horse” program?

Like the Greek myth, a Trojan horse is a malware program hiding inside another program that does something useful.  This could be a freeware program, like an MP3 encoder, a tool for breaking DVD copy protection or a game.  Whatever it is, when you install it on your system it also installs a “payload”—one or more malware programs such as a keylogger or a backdoor.  (See also, What is spyware and malware?)
U.S.
Subscribe to Trojan horse