Uses of Trojan Horse
There are many ways that it can be used :
- Spy: Some Trojans act as spyware. It is designed to take the data from the victim like social networking(username and passwords), credit card details, and more.
- Creating backdoors: The Trojan makes some changes in the system or the device of the victim, So this is done to let other malware or any cyber criminals get into your device or the system.
- Zombie: There are many times that the hacker is not at all interested in the victim’s computer, but they want to use it under their control.
Trojan Horse in Information Security
Any malicious software intended to harm or exploit any programmable device, service, or network is referred to as malware. Malware includes computer viruses, worms, Trojan horses, ransomware, spyware, and other malicious programs. In this article we will understand about Trojan Horse virus.