A program which claims to perform one function but actually does another, typically malicious. Trojans can take the form of attachments, downloads, and fake videos/programs. Once active on a system, the Trojan may do a number of things including steal sensitive data, monitor webcams, upload files to a third-party server, or just play pranks on the system owner by opening the CD tray, switching off the screen, or redirecting them to shock sites and other unwanted content.

Cybersecurity info you can’t do without

Want to stay informed on the latest news in cybersecurity? Sign up for our newsletter and learn how to protect your computer from threats.

Select your language