Eye on Tech | What is a Trojan Horse and How Does It Work?



Eye on Tech : What is a Trojan Horse and How Does It Work?

What is a Trojan Horse and How Does It Work?

Trojan horses: https://www.techtarget.com/searchsecurity/definition/Trojan-horse/?utm_source=youtube&utm_medium=description&utm_campaign=112019TROJAN&utm_content=TROJAN&Offer=OTHR-youtube_OTHR-video_OTHR-TROJAN_2019NOV21_TROJAN
Top network attacks: https://www.techtarget.com/searchnetworking/feature/Top-network-attacks-of-2020-that-will-influence-the-decade?utm_source=youtube&utm_medium=description&utm_campaign=112019TROJAN&utm_content=TROJAN&Offer=OTHR-youtube_OTHR-video_OTHR-TROJAN_2019NOV21_TROJAN

Whether in Troy or your computer, a Trojan horse is bad news. In fact, a Trojan is an insidious piece of malware that infects a host computer and potentially takes it over, including the ability to peep through the camera. Watch the video to learn more about how a Trojan horse works.

So what do you think? Ever accidentally click and install a Trojan? How did you deal with it? Let us know in the comments below, and don’t forget to hit that like button.

Subscribe to Eye on Tech: https://www.youtube.com/EyeOnTech
Stay up on the latest security news: https://www.techtarget.com/searchsecurity/
Follow us on Twitter: https://twitter.com/SearchSecurity
Like us on LinkedIn: https://www.linkedin.com/showcase/techtarget-security/
Like us on Facebook: https://www.facebook.com/SearchSecurity.com

#TrojanHorse #Malware #EyeOnTech

trojan