Glossary
Easy-to-understand definitions for common cybersecurity terms and topics.
Hello!
You’re about to visit our web page in English
Would you like to continue?
If this is not what you’re looking for,
A Trojan is a type of malware that masquerades as legitimate or useful software in order to trick a user into installing it. Once inside a system, it enables adversaries to take actions without the user's knowledge, such as installing other malicious programs, stealing data, or remotely controlling the device.
The effects of a Trojan vary depending on its purpose. Some of the most common actions include:
Many Trojans are designed to remain hidden for long periods of time, operating in the background.
In recent years, particularly harmful Trojan variants have emerged. Below, we look at some of the most infamous:
A banker Trojan capable of stealing users’ credentials and spreading rapidly across networks. It typically spreads via emails with infected attachments.
This mainly affects Android users. Spread via fake SMS messages, it can intercept messages and steal personal data.
Another banker Trojan designed to steal financial credentials through advanced keylogging techniques and tampering with online forms.
One of the best-known Trojans, it was designed to steal financial information and control browsers. Zeus is still the model on which today's Trojans are based.
This hides on Android devices and is extremely difficult to remove. It can reinstall itself even after a factory reset. It masquerades as a cleaning app.
Trojans spread through social engineering and covert distribution techniques:
Recent cases even show fake online video meetings as a ruse to distribute Trojans disguised as plug-ins or updates.
A security solution such as Panda Dome provides real-time protection against Trojans and other threats.
Avoid installing programs or opening documents from suspicious emails or unofficial sites.
Regular updates fix vulnerabilities that Trojans could exploit.
Doing this can prevent credential theft if a Trojan tries to access your accounts. You can use Panda Dome's free password generator to create strong, secure passwords. Or, for a more advanced option, Panda Dome Password Manager can help you manage your passwords and securely store your personal information.
Strange behavior, sudden slowdowns, or unauthorized connections can all be signs of infection.
Discover the Panda Dome plan that best fits your needs
You can take a look to every single product page (Panda Dome Essential, Panda Dome Advanced, Panda Dome Complete and Panda Dome Premium) or compare all our plans to take a decision.
Digital security is everyone's responsibility. With the right information and tools, you can reduce risks and use the Internet with peace of mind. Explore our guides and protect your online privacy.
Glossary
Easy-to-understand definitions for common cybersecurity terms and topics.
BlPanda Security
Discover expert advice, detailed tips, and the latest cybersecurity news.
Panda Security, a WatchGuard Technologies brand, offers the most advanced protection for your family and business. Its Panda Dome range provides maximum security against viruses, ransomware and computer espionage, and is compatible with Windows, Mac, Android and iOS.