Wednesday, 4 January 2017

Trojan horse

By,
Pankaj

What is  trojan horse attack?
Imagine that when you opened your E-mail this morning, there was a message from a person you don't know with a subject line of  'I've been trying to get a hold of you. Do you click on the hyperlink out of curiosity or is it better to delete it.Daily basis, thousands of computer users unintentionally ingest and launch a Trojan horse virus and infect their home Laptop. 

Trojan viruses and malicious code are used to attack mobile platforms as well as personal computers. To define a Trojan horse, it's important first to describe what a Trojan horse conveys, which is a virus or malware.
Virus is usually self-replicating, whereas malware is non-replicating, but both are intended to cause damage to a computer and its resources.
Trojan  is a coded program which masks the existence of a virus or malware by making its appearance look normal while containing malicious utilities transparent to the user. 

Trojan is a type of malware that is often disguised as legitimate software. It can be employed by cyber-thieves and hackers trying to gain access to users' systems. Computer users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated, trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system. These actions can include:
1.Deleting data
2.Blocking data
3.Modifying data
4.Copying data
5.Disrupting the performance of computers or computer networks

How to protect yourself against Trojans attack?
Installing effective anti-virous software, you can defend your devices including PCs, laptops, tablets and smartphones against trojans.Kaspersky Lab has anti-malware products that defend the following devices against Trojans:
1.Windows PCs
2.Linux computers
3.Apple Macs
4.Smartphones
5.Tablets

How Devices Get Infected ?
Imagine of a nice, ripe orange. It looks very appetizing and you are hungry. Once take your first bite, you find out the fruit is bitter and nothing at all like you had expected. Trojan is not much different than the orange instead of a nice destructive code. Needless to say, even though the packaging is inviting, the contents can lead to lost files and a harm to computer. 

A software programs Trojan can appear as a game a mobile application a utility program or a textual hyperlink. Each intends to enhance interest and to entice an unsuspecting user to download the disguised malware or virus.Downloaded and installed the infection is free to collect personal information destroy files and records and eventually render your computer or network unusable. 
Cybercriminals purposely create malware and virus packages with the intention of either obtaining personal information or destroying computer records and files. By hiding the malicious code and making it appear innocent, many individuals will overlook the possibility of a Trojan horse and download the package without thinking. 
Avoiding Infection ?
Cyber criminals are becoming inventive in ways of disguising a harmful virus or malicious code .Trojan horse is very real and can cause catastrophic damages to personal computers and corporate networks. As long as we connect to the Internet, few platforms or devices are safe. Think about it, personal computers, Apple platforms, Android tablets, and even smartphones are no longer safe and are subject to infections caused by a Trojan horse.