

This type of malware acts discretely, opening security backdoors to give attackers or other malware variants easy access to the system.

Trojan horses (or simply Trojans) disguise themselves as a legitimate application or just hide within one. Trojans are named after the story of the Trojan War, where the Greeks hid inside a wooden horse to infiltrate the city of Troy. Computer viruses are rare today, representing less than 10% of all malware. Viruses must be executed to run by an unsuspecting user performing an action such as opening an infected email attachment, running an infected executable file, visiting an infected website, or clicking on an infected website ad. There is a variety of malware types, including viruses, trojans, ransomware, key loggers, and worms.Ī computer virus is malicious code that attaches itself to clean files, replicates, and tries to infect other clean files.
