What are Trojan Horses and botnets?

A Trojan Horse is a program designed to cause destruction but deceives itself as a unsuspicious program. However, unlike a typical computer virus or worm, Trojans do not copy themselves or multiply within the file system, but they can still be as harmful. The term Trojan Horse is derived from the Ancient Greek story of the wooden horse that was used to help the Greek army invade the city of Troy by stealth, hence the programs getting installed without the user knowing.

Trojan horses (usually called Trojans for short) are very similar to spyware in that they get installed unwittingly by the user, usually within a legitimate program or disguising itself as an unsuspicious.  If installed or run, a Trojan will generally be granted full access to the machine.  From here the program has a lot of potential to cause damage to the file system, but this depends on the motives of the developer, which typically consist of:

  • Money Theft or Ransom

  • Data theft

  • Remote access, spying and surveillance

  • Destruction

  • Using the machine as a resource

Another common practice of a Trojan Horse is to infect multiple computers within a computer network, also known as a botnet.  This could be a major issue within a business environment causing dramatic consequences such as huge down time, resulting in loss of revenue.  The Trojan can also attach itself to an email client sending out bulk emails, spreading the virus (providing it’s opened and run) to all of the user’s contacts.  Again, within a business this could mean thousands of emails getting sent out, spreading the Trojan very rapidly, which could be great news for the Trojan creator if it’s motives are to collect credit card information.

 

Main Menu
Comparison Table

Our comparison tool allows you to directly compare different aspects of the products we have listed.

Compare Antivirus

Select a Provider

Using carefully selected questions, we can find you the best antivirus to fit your needs. By answering questions on topics ranging from budget to required features, you could find your perfect antivirus in just seconds.

Choose an Antivirus