Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Cyber Security Awareness Month Tip»Trojan Virus: What is it and How to avoid it
    Cyber Security Awareness Month Tip

    Trojan Virus: What is it and How to avoid it

    By Sabina PerezOctober 25, 20212 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    A Trojan virus is identical to the idea of the Trojan horse except instead of an army of men hidden inside, malware is concealed. There are different types of Trojan viruses but all have a similar end goal and are equally malicious. 

    The following are only a few examples:
    • Backdoor Trojan. This type of virus silently enters through a “backdoor” it creates. Once inside, the virus allows a malicious actor full access and control to your device. From here, other dangerous malware can be downloaded and data can be stolen. 
    • Banker Trojan. After infiltrating and infecting your device, this virus specifically attacks banking information. Any and all financial accounts are targeted by this kind of virus. 
    • Rootkit Trojan. Silently hiding in your device for the maximum amount of time before being discovered is this virus’ overall goal. This allows the cybercriminal to inflict the most damage it possibly can. 
    • Game-thief Trojan. Through online games, this variety of Trojan virus looks to steal gaming account information. 
    • SMS Trojan. This Trojan works to attack text messaging. It can block, delete, or hide messages. It can also send messages and overuse data to run up phone bills. 

     

    What can you do to avoid an attack?
    • Back up your device files. By having a copy of your files, you may not be able to stop cybercriminals from stealing data however, it will make restoring your computer much easier.
    • Keep your software up to date. Updating your device with the latest improvements protects you from security vulnerabilities and patches up other holes in the previous software version. 
    • Be wary of suspicious sites. Avoid unsafe sites by verifying legitimacy. If something strikes you as odd, trust your gut and leave the website. 
    • Only open email attachments sent by trusted addresses. This is another common way Trojan viruses enter your device. Do not trust sketchy or strange-looking emails. 
    • Watch for random pop-up windows. These can look like advertisements or false antivirus software alerts. Be cautious of what you click and be skeptical of random pop-up windows containing enticing promises. 

     

    Source: us.Norton.com

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Previous ArticleProtect Yourself from Identity Theft!
    Next Article You posted what?

    Related Posts

    5 Active Malware Campaigns in Early 2025: What You Need to Know

    10 Critical Network Pentest Findings IT Teams Overlook

    Report Phishing Instantly with PhishAlarm

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d