In computing, a trojan horse (or simply trojan; often capitalized, but see below) is a kind of malware that misleads users as to its true intent by disguising...
19 KB (1,865 words) - 14:43, 18 April 2025
Sub7 (redirect from Sub7 (trojan horse))
Sub7, or SubSeven or Sub7Server, is a Trojan horse - more specifically a Remote Trojan Horse - program originally released in February 1999. Because its...
18 KB (1,658 words) - 13:40, 27 January 2025
metaphorically. Trojan Horse may also refer to: Trojan horse (business), a business offer that appears to be a good deal but is not Trojan horse (computing), a computer...
2 KB (327 words) - 22:40, 20 May 2025
In computing, a zombie is a computer connected to the Internet that has been compromised by a hacker via a computer virus, computer worm, or trojan horse...
8 KB (922 words) - 17:17, 21 May 2025
scam Timeline of computer viruses and worms Trojan horse (computing) ZeroAccess botnet Zombie (computing) Virgillito, Dan (19 September 2014). "'Tiny...
6 KB (718 words) - 13:05, 11 November 2024
one Trojan horse (computing), or trojan, computer malware Trojan Nuclear Power Plant, in Oregon, U.S. Trojan Records, British record label Trojans, a group...
3 KB (386 words) - 21:16, 23 March 2025
Sock puppet account – False online identity used for deception Trojan horse (computing) – Type of malware Twinking – Disapproved behavior in role-playing...
16 KB (1,587 words) - 02:01, 20 May 2025
Linux malware (redirect from Linux trojan)
COW Ransomware Spyware Timeline of computer viruses and worms Trojan horse (computing) Granneman, Scott (October 2003). "Linux vs. Windows Viruses"....
58 KB (4,841 words) - 15:41, 27 May 2025
Computer virus File binder Individual mobility Malware Trojan horse (computing) Worm (computing) Mobile operating system "First worm for IOS". 11 August...
4 KB (333 words) - 05:16, 2 September 2024
Computer worm (redirect from Worm (computing))
virus or other problems Timeline of computer viruses and worms Trojan horse (computing) Worm memory test XSS worm Zombie (computer science) Barwise, Mike...
24 KB (2,746 words) - 09:26, 2 June 2025
Computer virus (redirect from Virus (computing))
Malware Source code virus Spam (electronic) Technical support scam Trojan horse (computing) Virus hoax Windows 7 File Recovery Windows Security and Maintenance...
92 KB (9,553 words) - 18:43, 29 May 2025
resulting in significant losses. Cute cat theory of digital activism Trojan horse (computing) Mooney, Greg. "Dancing Pigs and Other Dangers: 3 Popular Email...
6 KB (720 words) - 12:52, 27 September 2024
victims. Dendroid (Malware) Trojan horse (computing) Spyware Botnet Computer virus Backdoor (computing) Tiny Banker Trojan Zeus (malware) Gameover ZeuS...
9 KB (804 words) - 01:53, 26 May 2025
Back Orifice (redirect from Back Orifice (trojan horse))
Canadian hacking group QHA. Back Orifice 2000 Sub7 Trojan horse (computing) Malware Backdoor (computing) Rootkit MiniPanzer and MegaPanzer File binder Richtel...
4 KB (390 words) - 22:37, 29 April 2024
Macro virus (redirect from Macro virus (computing))
computers or steal private information Computer virus Computer worm Trojan horse (computing) – malware hidden inside anti-virus software or other apps Ransomware...
7 KB (788 words) - 02:03, 8 March 2025
binder Individual mobility Malware Mobile operating system Trojan horse (computing) Worm (computing) Zombie (computer science) "HummingBad: A Persistent Mobile...
3 KB (296 words) - 09:38, 25 August 2024
when the user is connected to a mobile connection. Trojan horse (computing) WAP "Xafecopy Trojan might be stealing money through your smartphone". The...
7 KB (627 words) - 21:00, 30 September 2022
Blackhole exploit kit (category Trojan horses)
Backdoor (computing) Botnet Computer virus Exploit HackTool.Win32.HackAV MPack (software) Spyware Trojan horse (computing) DarkComet – (Trojan / RAT) Howard...
5 KB (611 words) - 07:28, 11 May 2025
Clickbot.A (category Trojan horses)
Browser Helper Object Botnet Click farm Click fraud Download.ject Trojan horse (computing) ZeroAccess botnet Zombie (computer science) Walgampaya, Chamila;...
2 KB (175 words) - 22:31, 30 September 2022
refer to: Zombie (computing), a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program Zombie apocalypse...
232 bytes (63 words) - 01:09, 25 March 2020
concert to perform very large tasks. Fog computing – Distributed computing paradigm that provides data, compute, storage and application services closer...
77 KB (7,983 words) - 03:54, 13 May 2025
originated from. Exploit Exploit kit Trojan horse (computing) Spyware Botnet Computer virus Backdoor (computing) "Hackers target 'legitimate' sites"....
5 KB (403 words) - 23:37, 14 February 2025
Virut (category Distributed computing projects)
network. Command and control (malware) Zombie (computer science) Trojan horse (computing) Botnet Alureon Conficker Gameover ZeuS ZeroAccess botnet Regin...
5 KB (449 words) - 03:54, 26 June 2024
Mac to their threat list; in the category Viruses and Spyware : Trojan horse (computing) : Adware. As of November 2014, Genieo for Mac is flagged by Intego...
10 KB (767 words) - 08:59, 7 September 2024
Man-in-the-browser (redirect from Bugat (Trojan horse))
form of Internet threat related to man-in-the-middle (MITM), is a proxy Trojan horse that infects a web browser by taking advantage of vulnerabilities in...
22 KB (1,867 words) - 00:56, 10 April 2025
Blackmail Botnet Cybercrime DoSnet Email bomb Hacking Robert Schifreen Trojan horse (computing) Zombie (computer science) Fafinski, S. (2007). "Cyber crime"....
16 KB (2,111 words) - 21:20, 25 May 2025
SpySheriff (category Windows trojans)
will solve this problem.[citation needed] Rogue security software Trojan horse (computing) Also known by numerous other names, including BraveSentry, Pest...
9 KB (723 words) - 18:43, 6 February 2025
Zeus (malware) (redirect from Zeus (trojan horse))
Zeus is a Trojan horse malware package that runs on versions of Microsoft Windows. It is often used to steal banking information by man-in-the-browser...
13 KB (1,142 words) - 20:23, 2 February 2025
Christmas Tree EXEC (category Trojan horses)
blinking colored characters (asterisks) to represent tree lights. Trojan horse (computing) Timeline of computer viruses and worms ASCII art Tom Scott (2015-12-21)...
6 KB (615 words) - 14:33, 27 December 2024
binder Individual mobility Malware Dendroid (malware) Trojan horse (computing) Worm (computing) Mobile operating system Mobile malware attacks and defense...
20 KB (2,240 words) - 02:24, 13 May 2025