When.com Web Search

  1. Ads

    related to: examples of trojan viruses list

Search results

  1. Results From The WOW.Com Content Network
  2. List of computer worms - Wikipedia

    en.wikipedia.org/wiki/List_of_computer_worms

    Trojan worm February 14, 2006 Most known for being the first virus targeting Mac computers. Morris: November 2, 1988 Robert Tappan Morris: Widely considered to be the first computer worm. Although created for academic purposes, the negligence of the author unintentionally caused the worm to act as a denial of service attack.

  3. Category:Trojan horses - Wikipedia

    en.wikipedia.org/wiki/Category:Trojan_horses

    This category is for Trojan horses, a form of computer malware. ... Category:Computer viruses; Subcategories. This category has the following 3 subcategories, out of ...

  4. Timeline of computer viruses and worms - Wikipedia

    en.wikipedia.org/wiki/Timeline_of_computer...

    The rootkit creates vulnerabilities on affected computers, making them susceptible to infection by worms and viruses. Late 2005: The Zlob Trojan, is a Trojan horse program that masquerades as a required video codec in the form of the Microsoft Windows ActiveX component. It was first detected in late 2005.

  5. Trojan horse (computing) - Wikipedia

    en.wikipedia.org/wiki/Trojan_horse_(computing)

    A Trojan horse is a program that purports to perform some legitimate function, yet upon execution it compromises the user's security. [17] A simple example is the following malicious version of the Linux sudo command. An attacker would place this script in a publicly writable directory (e.g., /tmp).

  6. Comparison of computer viruses - Wikipedia

    en.wikipedia.org/wiki/Comparison_of_computer_viruses

    By the time the virus is identified, many names have been used to denote the same virus. Ambiguity in virus naming arises when a newly identified virus is later found to be a variant of an existing one, often resulting in renaming. For example, the second variation of the Sobig worm was initially called "Palyh" but later renamed "Sobig.b ...

  7. Malware - Wikipedia

    en.wikipedia.org/wiki/Malware

    Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves. [ 45 ] In spring 2017, Mac users were hit by the new version of Proton Remote Access Trojan (RAT) [ 46 ] trained to extract password data from various sources, such as browser auto-fill data, the Mac ...