Pages

Pages - Menu

Pages - Menu

Friday, 2 February 2018

Beware!! What is Trojan Horse? Mobile Phone Malicious Ads? Fake Softwares?

There is a story behind Trojan horse

Detail from The Procession of the Trojan Horse in Troy by DomenicoTiepolo (1773), inspiredby Virgil's Aeneid

 TROJAN HORSE

The Trojan Horse is a tale from the Trojan War about the subterfuge that the Greeks used to enter the independent city of Troy and win the war. In the canonical version, after a fruitless 10-year siege, the Greeks constructed a huge wooden horse , and hid a select force of men inside. The Greeks pretended to sail away, and the Trojans pulled the horse into their city as a victory trophy. That night the Greek force crept out of the horse and opened the gates for the rest of the Greek army, which had sailed back under cover of night. The Greeks entered and destroyed the city of Troy, ending the war.


Uses of Trojan horse

When a Trojan horse becomes active, it puts sensitive user data at risk and can negatively impact performance. Once a Trojan has been transferred, it can:


  • Give the attacker backdoor control over the computing device.


  • Record keyboard strokes to steal the user's account data and browsing history.

  • Download and install a virus orworm to exploit a vulnerability in another program.

  • Install ransomware to encrypt the user's data and extort money for the decryption key.

  • Activate the computing device's camera and recording capabilities.


          • Turn the computer into a zombie bot that can be used to carry out click fraud schemes or illegal actions.

          • Legally capture information relevant to a criminal investigation for law enforcement.



          How a TROJAN HORSE work


          Here is one example of how a Trojan horse might be used to infect a personal computer:

          The victim receives an official-looking email with an attachment. The attachment contains malicious code that is executed as soon as the victim clicks on the attachment. Because nothing bad happens and the computer continues to work as expected, the victim does not suspect that the attachment is actually a Trojan horse and his computing device is now infected.




          BEWARE MOBILE SCAREWARE ADS





          The fact that the hackers can alter the advert is a weakness in the ad platform itself and hopefully once the ad company spots these malicious ads it will close the security hole. This particular ad tries to get the user to download appmarket_2.0.2.apk which installs the Android/Hnd Adwo malware. According to AVG, reports about this particular malware have rocketed over the last week but are now in decline.
          Android/Hnd Adwo displays unwanted advertisements as notifications and it requires the complete removal of the infected app to block the ads from being pushed. It is currently ranked 7 in the world for mobile, online and PC malware and has affected more than 10,000,000 users!


          It is important that you don’t follow through on these ads and don’t download or install any .apk files. You should also notify the webmaster of the site where the ad appeared.


          If you do want to run an antivirus app on your device make sure you checkout our recommendations and always download it from Google Play and not from an untrusted third-party site.



          Watch video:-