Trojan horse is a common type of computer virus. The name comes from the history of the Trojan War, in which the Greeks sent a large wooden horse filled with Greek soldiers into the city as a gift and then master the Trojans.
Trojan horse virus works on the same principle, disguised as a program that appears legitimate, only to trick users into installing them.
Here are the common types of attacks carried out by a Trojan horse:
Steal information
Some kind of Trojan horses infect computers and steal valuable information such as bank accounts, credit card information, or other types of sensitive data. This type of Trojan horse virus type generally also has a key-logger that records every keystroke on the keyboard.
Take over control
This type of Trojan horse is more dangerous because it tried to gain control over infected computers. Once installed, the Trojan horse allows remote attackers to set the connection to an infected computer and take control. Once taken over, hackers can steal sensitive and confidential data from the computer.
Utility attacks
Attackers use the so-called Trojan utility in combination with other types of Trojan or virus to produce a more complex attack. Raid utility attempted to infect a computer as an intermediary point for further attacks. In addition, the attackers used Trojan utility as a cover to hide their true identity.
Vandal attack
The attacker designs this type of Trojan to cause damage to the infected computer. The effects can vary from a simple change, but annoying, such as changing the wallpaper to remove operating system files or all files in your hard drive.
Denial of Service (DoS)
DoS attacks are the most destructive virus Trojan horse can do. After the Trojan infect a large number of computers, the creator of the Trojan to take control of infected computers and launch an attack on a server or a particular website.
Due to the high number of simultaneous connections, server or website is under attack finally stopped working. The higher the number of computers involved in the attack, the faster the target website malfunction. The attacker usually tries to infect a large number of computers to minimize the time required for the success of the attack and to ensure the widest possible impact attack effects.
Home
» bank accounts
» credit card information
» Software amp; Application
» Trojan horse Attacks
» Trojan horse virus
» Five Type of Trojan horse Attacks
[...] BlackBerry Playbook is the first tablet made by RIM (Research In Motion), which is famous for its BB mobile. Therefore, in solid black tablet is worthy of further investigation. Although there how to use the manual, but there are also tables of some of the things that cannot easily be found. So that your experience in air-BB-Playbook more exciting, consider the tips & tricks Playbook follows: [...]
ReplyDelete