• In computing, a Trojan horse (or simply Trojan) is any malware that misleads users of its true intent by disguising itself as a standard program. The...
    20 KB (2,050 words) - 17:35, 28 December 2024
  • metaphorically. Trojan Horse may also refer to: Trojan horse (business), a business offer that appears to be a good deal but is not Trojan horse (computing), a computer...
    2 KB (318 words) - 18:35, 6 July 2024
  • one Trojan horse (computing), or trojan, computer malware Trojan Nuclear Power Plant, in Oregon, U.S. Trojan Records, British record label Trojans, a group...
    3 KB (369 words) - 19:00, 10 September 2024
  • Sub7 (redirect from Sub7 (trojan horse))
    Sub7, or SubSeven or Sub7Server, is a Trojan horse - more specifically a Remote Trojan Horse - program originally released in February 1999. Its name was...
    16 KB (1,692 words) - 10:54, 29 November 2024
  • Thumbnail for Zombie (computing)
    In computing, a zombie is a computer connected to the Internet that has been compromised by a hacker via a computer virus, computer worm, or trojan horse...
    8 KB (922 words) - 03:21, 22 December 2024
  • Canadian hacking group QHA. Back Orifice 2000 Sub7 Trojan horse (computing) Malware Backdoor (computing) Rootkit MiniPanzer and MegaPanzer File binder Richtel...
    4 KB (390 words) - 22:37, 29 April 2024
  • scam Timeline of computer viruses and worms Trojan horse (computing) ZeroAccess botnet Zombie (computing) Virgillito, Dan (19 September 2014). "'Tiny...
    6 KB (718 words) - 13:05, 11 November 2024
  • resulting in significant losses. Cute cat theory of digital activism Trojan horse (computing) Mooney, Greg. "Dancing Pigs and Other Dangers: 3 Popular Email...
    6 KB (720 words) - 12:52, 27 September 2024
  • Christmas Tree EXEC (category Trojan horses)
    blinking colored characters (asterisks) to represent tree lights. Trojan horse (computing) Timeline of computer viruses and worms ASCII art Tom Scott (2015-12-21)...
    6 KB (615 words) - 14:33, 27 December 2024
  • Thumbnail for Catfishing
    Sock puppet account – False online identity used for deception Trojan horse (computing) – Type of malware Twinking – Disapproved behavior in role-playing...
    32 KB (3,294 words) - 20:17, 16 December 2024
  • Zeus is a Trojan horse malware package that runs on versions of Microsoft Windows. It is often used to steal banking information by man-in-the-browser...
    13 KB (1,141 words) - 08:10, 8 September 2024
  • Thumbnail for Computer worm
    virus or other problems Timeline of computer viruses and worms Trojan horse (computing) Worm memory test XSS worm Zombie (computer science) Barwise, Mike...
    23 KB (2,608 words) - 10:24, 31 December 2024
  • form of Internet threat related to man-in-the-middle (MITM), is a proxy Trojan horse that infects a web browser by taking advantage of vulnerabilities in...
    22 KB (1,867 words) - 04:05, 1 January 2025
  • computers or steal private information Computer virus Computer worm Trojan horse (computing) – malware hidden inside anti-virus software or other apps Ransomware...
    7 KB (788 words) - 10:49, 21 October 2024
  • Computer virus File binder Individual mobility Malware Trojan horse (computing) Worm (computing) Mobile operating system "First worm for IOS". 11 August...
    4 KB (333 words) - 05:16, 2 September 2024
  • victims. Dendroid (Malware) Trojan horse (computing) Spyware Botnet Computer virus Backdoor (computing) Tiny Banker Trojan Zeus (malware) Gameover ZeuS...
    9 KB (804 words) - 00:48, 15 July 2024
  • Thumbnail for Timeline of computer viruses and worms
    chronological timeline of noteworthy computer viruses, computer worms, Trojan horses, similar malware, related research and events. John von Neumann's article...
    71 KB (7,753 words) - 17:33, 30 December 2024
  • Linux malware (redirect from Linux trojan)
    COW Ransomware Spyware Timeline of computer viruses and worms Trojan horse (computing) Granneman, Scott (October 2003). "Linux vs. Windows Viruses"....
    57 KB (4,822 words) - 00:44, 14 November 2024
  • Thumbnail for Computer virus
    Malware Source code virus Spam (electronic) Technical support scam Trojan horse (computing) Virus hoax Windows 7 File Recovery Windows Security and Maintenance...
    91 KB (9,456 words) - 23:03, 30 December 2024
  • binder Individual mobility Malware Mobile operating system Trojan horse (computing) Worm (computing) Zombie (computer science) "HummingBad: A Persistent Mobile...
    3 KB (296 words) - 09:38, 25 August 2024
  • binder Individual mobility Malware Dendroid (malware) Trojan horse (computing) Worm (computing) Mobile operating system Mobile malware attacks and defense...
    20 KB (2,241 words) - 19:19, 2 July 2024
  • Blackhole exploit kit (category Trojan horses)
    Backdoor (computing) Botnet Computer virus Exploit HackTool.Win32.HackAV MPack (software) Spyware Trojan horse (computing) DarkComet – (Trojan / RAT) Howard...
    5 KB (611 words) - 21:02, 30 September 2022
  • Virut (category Distributed computing projects)
    network. Command and control (malware) Zombie (computer science) Trojan horse (computing) Botnet Alureon Conficker Gameover ZeuS ZeroAccess botnet Regin...
    5 KB (449 words) - 03:54, 26 June 2024
  • when the user is connected to a mobile connection. Trojan horse (computing) WAP "Xafecopy Trojan might be stealing money through your smartphone". The...
    7 KB (627 words) - 21:00, 30 September 2022
  • SpySheriff (category Windows trojans)
    will solve this problem.[citation needed] Rogue security software Trojan horse (computing) Also known by numerous other names, including BraveSentry, Pest...
    9 KB (715 words) - 07:18, 29 December 2024
  • Thumbnail for Cloud computing
    concert to perform very large tasks. Fog computing – Distributed computing paradigm that provides data, compute, storage and application services closer...
    69 KB (7,265 words) - 04:25, 27 December 2024
  • Clickbot.A (category Trojan horses)
    Browser Helper Object Botnet Click farm Click fraud Download.ject Trojan horse (computing) ZeroAccess botnet Zombie (computer science) Walgampaya, Chamila;...
    2 KB (175 words) - 22:31, 30 September 2022
  • classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan horses, logic bombs, ransomware, spyware, adware, rogue software, wipers and...
    76 KB (7,586 words) - 04:00, 23 December 2024
  • Computer virus File binder Individual mobility Malware Trojan horse (computing) Worm (computing) Mobile operating system "First Android Malware Utilizing...
    3 KB (233 words) - 19:20, 2 July 2024
  • Thumbnail for Genieo
    Mac to their threat list; in the category Viruses and Spyware : Trojan horse (computing) : Adware. As of November 2014, Genieo for Mac is flagged by Intego...
    10 KB (767 words) - 08:59, 7 September 2024