When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Trojan horse (computing) - Wikipedia

    en.wikipedia.org/wiki/Trojan_horse_(computing)

    In computing, a Trojan horse (or simply Trojan) is a malware that misleads users of its true intent by disguising itself as a normal program. The term is derived from the ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy. [1] Trojans are generally spread by some form of social engineering.

  3. Timeline of computer viruses and worms - Wikipedia

    en.wikipedia.org/wiki/Timeline_of_computer...

    The rootkit creates vulnerabilities on affected computers, making them susceptible to infection by worms and viruses. Late 2005: The Zlob Trojan, is a Trojan horse program that masquerades as a required video codec in the form of the Microsoft Windows ActiveX component. It was first detected in late 2005.

  4. Graybird - Wikipedia

    en.wikipedia.org/wiki/Graybird

    Graybird is a Trojan horse that hides its presence on compromised computers and downloads files from remote Web sites. There are many variations of this virus. It was discovered on September 3, 2003 and affects Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP, and Windows Vista.

  5. List of computer worms - Wikipedia

    en.wikipedia.org/wiki/List_of_computer_worms

    Trojan worm February 14, 2006 Most known for being the first virus targeting Mac computers. Morris: November 2, 1988 Robert Tappan Morris: Widely considered to be the first computer worm. Although created for academic purposes, the negligence of the author unintentionally caused the worm to act as a denial of service attack.

  6. Category:Trojan horses - Wikipedia

    en.wikipedia.org/wiki/Category:Trojan_horses

    This category is for Trojan horses, a form of computer malware. For the Greek legend about a hollow wooden horse that inspired the computing term, see Trojan horse . See also

  7. Mocmex - Wikipedia

    en.wikipedia.org/wiki/Mocmex

    Therefore, the virus is difficult to remove. Furthermore, it spreads to other portable storage devices that were plugged into an infected computer. Industry experts describe the writers of the Trojan Horse as professionals and describe Mocmex as a "nuclear bomb of malware".

  8. Comparison of computer viruses - Wikipedia

    en.wikipedia.org/wiki/Comparison_of_computer_viruses

    Leap - Mac OS X Trojan horse; Shamoon a wiper virus with stolen digital certificates destroyed over 35,000 computers owned by Saudi Aramco. Storm Worm - A Windows trojan horse that forms the Storm botnet; Stuxnet First destructive ICS-targeting Trojan which destroyed part of Iran's nuclear program.

  9. Storm Worm - Wikipedia

    en.wikipedia.org/wiki/Storm_Worm

    The Storm Worm (dubbed so by the Finnish company F-Secure) is a phishing backdoor [1] [2] Trojan horse that affects computers using Microsoft operating systems, [3] [4] [5] discovered on January 17, 2007. [3] The worm is also known as: Small.dam or Trojan-Downloader.Win32.Small.dam ; CME-711 ; W32/Nuwar@MM and Downloader-BAI (specific variant)