When.com Web Search

  1. Ads

    related to: trojan malware examples

Search results

  1. Results From The WOW.Com Content Network
  2. Trojan horse (computing) - Wikipedia

    en.wikipedia.org/wiki/Trojan_horse_(computing)

    In computing, a Trojan horse (or simply Trojan) is a malware that misleads users of its true intent by disguising itself as a normal program. The term is derived from the ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy. [1] Trojans are generally spread by some form of social engineering.

  3. Alureon - Wikipedia

    en.wikipedia.org/wiki/Alureon

    Alureon (also known as TDSS or TDL-4) is a trojan and rootkit created to steal data by intercepting a system's network traffic and searching for banking usernames and passwords, credit card data, PayPal information, social security numbers, and other sensitive user data. [1]

  4. Timeline of computer viruses and worms - Wikipedia

    en.wikipedia.org/wiki/Timeline_of_computer...

    The rootkit creates vulnerabilities on affected computers, making them susceptible to infection by worms and viruses. Late 2005: The Zlob Trojan, is a Trojan horse program that masquerades as a required video codec in the form of the Microsoft Windows ActiveX component. It was first detected in late 2005.

  5. The Many Faces of Malware - AOL

    www.aol.com/products/blog/the-many-faces-of-malware

    Trojans: Exposes your personal and confidential information to hackers by opening a “backdoor” to your computer after downloading a file or program that is disguised as something good but is ...

  6. Category:Trojan horses - Wikipedia

    en.wikipedia.org/wiki/Category:Trojan_horses

    This category is for Trojan horses, a form of computer malware. For the Greek legend about a hollow wooden horse that inspired the computing term, see Trojan horse.

  7. List of computer worms - Wikipedia

    en.wikipedia.org/wiki/List_of_computer_worms

    Trojan worm February 14, 2006 Most known for being the first virus targeting Mac computers. Morris: November 2, 1988 Robert Tappan Morris: Widely considered to be the first computer worm. Although created for academic purposes, the negligence of the author unintentionally caused the worm to act as a denial of service attack.