Trojan Horse Programs and How to Avoid Them

Scripted’s talented community of freelance writers have a variety of expertise and specialties. While many of our customers hire writers to execute their content marketing strategy, our writers deliver high-quality content in many formats. You can find content writers, blog writers, ghostwriters, and SEO writers all with experience in your niche.

The following is a an example of a Computer Security blog post:

Malware exists in many forms, so how can you protect yourself from them all? The best defense is knowing what's out there and what it looks like.

In Greek mythology, Athenian soldiers hid inside a giant wooden horse which they presented, ostensibly as a tribute, to inhabitants of the walled city of Troy. Once brought inside the walls, they waited until nightfall, then stealthily opened the gates of the city to invading forces. Thus the Trojan horse, by pretending to be something it was not, led to the downfall of the city-state of Troy. Today, the "Trojan horse" is a horse of a different color. Unlike the one-time occurrence of the original, the modern Trojan horse seems to be multiplying in numbers and successes. A stark example would be the so-called Zeus program, which was first detected in 2007. It's estimated that Zeus has infected millions of computers worldwide, stealing banking information, money and personal information (like Social Security numbers) that can be sold on the black market.While most of us think we're safe from cyber invasions as long as we don't open unidentified email attachments, a Trojan horse can be spread through other means. Recently, a bogus website on Facebook about the NFL was exposed as a Trojan horse. With Facebook being noteworthy for its easy access to hackers (just Google "hacking facebook profiles" and an entire menu of methodologies and instructions pops up), it's only natural that it would be a prime target for cyber criminals. And according to experts, it remains so. Once a Trojan horse gets onto a computer, that computer can become a "bot" or "zombie": that is, a computer used to relay malware programs via the Internet. Strung together in a peer-to-peer network, these "botnets" operate without computer owners' knowledge. The malware they carry can then be controlled by the hacker who initiated the program. For example, a hacker can create a Trojan horse, spread it through a seemingly innocuous website link opened by unaware computer owners, and then use the Trojan horse to attack a competitor's website or run a financial scam. This way, the thousands of computers on the botnet become unwitting participants. There's no foolproof way to avoid falling victim to a Trojan horse (except to never connect to the Internet), but there are some measures you can take to minimize your vulnerability: - Never open an email attachment from an unknown and mistrusted source. - The same goes for hyperlinks sent by email. Even if it comes from a friend, the link itself may be carrying a Trojan horse. Satirical political links, for instance, are constantly being emailed en masse to people of like-minded persuasions. Open them at your own risk. - Don't be fooled by emails purported to be from legitimate marketers. If you get an email with a link to "customer service" because your order has been delayed or you're due a rebate, and you have no idea what the sender is talking about, delete it immediately. Don't worry. If it's legitimate, they'll find a way to reach you. - Unauthorized downloads of movies and music are often accompanied by a Trojan horse. Finally, even though anti-virus softwares cannot guarantee that you won't acquire a Trojan horse, a good anti-virus solution can often detect and quarantine the offending program. Additionally, if you make sure you have downloaded the latest service pack and all security patches sent by the makers of your computer's operating system, you are decreasing your likelihood of being victimized. Trojan horses are considered malware because their intention is to do evil. It's in all of our best interests to defeat them.  

Ron L.

Ron L.

La Grange, Illinois, United States

Ron L. is one of Scripted's original writers, and has done articles on a variety of topics, mostly IT related but as diverse as the medical diagnosis code expansion to the world's ten coolest subways. Ron is a software salesman and amateur script writer in his regular life, a...

Jobs Completed 213 Customer Ratings 43 Job Success 206/213 (96%)

Other content marketing examples from Ron L.

Self-Publishing: Detrimental or Revolutionary?

Self-publishing is viewed by some as having been detrimental to the quality of writing, but that ... Read More

Private Clouds and Public Clouds

Although cloud computing is relatively new, there is already a separation between the private and... Read More

Similar content marketing examples from other writers

Home Automation: How Smart Home Technology Will Improve Your Life

No longer relegated to the domain of science fiction, the internet of things is here. The intern... Read More

Top 5 skills for IT Security Specialist

5 Top Skills for an IT Security SpecialistThe threat of cyber attacks and security breaches is in... Read More

Multi-screen or single-screen?

Digital devices are evolving to consolidate our needs to as few screens as possible. Should we be... Read More

To Upgrade or Not Upgrade ... That Is the Question!

To Upgrade or Not Upgrade ... That Is the Question!Fear is often the driver behind many businesse... Read More

Ethernet vs WiFi in Gaming: Is There a Real Difference?

A common question in PC gaming is the choice between playing over Ethernet cables (wired) or Wi... Read More

Protecting Gamers: Answering Your Questions About Stopping DoS and DDoS Attacks

Have you ever experienced a suspiciously well-timed connection drop while playing an online game?... Read More