Home Page Navigation Contents Contact Sitemap Search

Trojan Horse

Mal­ware dis­guising itself as some­thing useful or a game, how­ever with com­pletely dif­ferent objec­tives in reality. Tro­jans can for instance cap­ture, change or delete pass­words or other con­fi­den­tial data, or transmit them to an attacker.