Definition: A Trojan horse is called such as a reference to the story of the Trojan horse from Greek legend. It is a malicious program disguised as a normal application. Trojan horse programs do not replicate themselves like a virus, but they can be propagated as attachments to a virus.
Latest posts by Tony Bradley (see all)
- Post-Quantum Cryptography: Preparing for the Next Era of Cybersecurity - January 2, 2025
- Navigating the Future of Secure Code Signing and Cryptography - December 20, 2024
- The Rise of Agentic AI: How Hyper-Automation is Reshaping Cybersecurity and the Workforce - December 20, 2024
Comments are closed.