Malicious files or applications that are designed to look trustworthy. Example – Ever visit a webpage and see a popup that says “Antivirus Expired, click here”? These can often be fairly easy to spot, but Trojans can also disguise themselves in more sophisticated ways. Phishing emails are a great way for attackers to send Trojans that may look like trusted word documents, but are carrying a malicious payload. Luckily, a Trojan will not work on its own and needs a user to allow for download. The best way to prevent this from happening is to stay vigilant (AND NOT CURIOUS) when allowing downloads.  

« Back to Glossary Index
Scroll to Top