MUO

Trojan Horse

Readers like you help support MUO. When you make a purchase using links on our site, we may earn an affiliate commission. Read More.

latest

An illustration of fake ChatGPT logos
These 9 Fake ChatGPT Virus and Malware Apps Can Steal Your Data

Does ChatGPT have viruses? Malicious counterparts certainly do. Here are nine fake chatbot alternatives that you need to steer clear of.

By 
pair of nvidia rtx 2080 gpus
Can GPUs Be Exploited by Cybercriminals?

Hackers will try to take advantage of everything they can—but what about graphics processing units? Can you be targeted through your GPU?

By 
anonymous hacker on a pc
5 Common Methods Hackers Use to Break Into Your Bank Account

Knowing how hackers break into bank accounts is useful. Here are ways hackers can gain access to your savings and clear you out.

By 
Mockup of a Laptop Showing the Pop-up of Wacatac.B!ml Trojan Virus
What Is the Wacatac.B!ml Trojan? How to Remove It From Windows

Infected with the Wacatac.B!ml Trojan? Here's how to fix it on Windows.

By 
Exterior view of Eldorado Arcade, one of its existing venues in the series
What Can You Learn About Cybersecurity From the Mr. Robot TV Series?

Mr. Robot stars Rami Malek as hacker, Elliot Alderson. But how realistic is it? What can viewers learn about fighting hackers from the TV show?

By 
Laptop screen displaying a pirate flag
What Is the Difference Between a Worm, a Trojan, and a Virus?

You might have heard someone call any malicious software a "virus," but that isn't accurate. Different types of malware function in distinct ways.

By 
OneNote logo inside Sony Android Phone
How Hackers Are Using OneNote Files to Spread Malware

Do you download OneNote files as attachments? Most people trust such files. But they could download malware onto your device.

By 
greek myth of a trojan entering the city of troy
Can Trojans Replicate Themselves?

You've likely heard Trojan horses be called "viruses", but that's not technically true. Here's why.

By 
Image of a Trojan statue
What Are Android Banking Trojans and How Do You Avoid Them?

Any device can be infected by a Trojan Horse, and Android phones are especially vulnerable. So what can you do to protect yourself and your finances?

By 
malware warning on laptop screen
What Kind of Malware Is the Most Dangerous?

There are so many malicious programs now, you might be curious about which is actually the most dangerous. Here's what you should know.

By 
graphic of horse in front of green matrix background
The 8 Most Common Types of Trojans You Should Know About

Trojans hide in seemingly harmless software, then spring their trap. Your best defense is knowledge, so here are the common Trojans to look out for.

By 
Person with Mask Sitting on Chair In front of a Computer Screen
How to Prevent Remote Access Trojan Attacks and Stay in Control of Your PC

Remote access trojans grant attackers full control over your machine—a terrifying scenario. Here's how to beef up your defenses.

By 
device webcam
Should You Always Put Tape Over Your Laptop Camera?

Don't like the thought of a hacker watching you through your webcam? Then you might consider covering it up. But how? What should you use?

By 
anonymous hooded figure on laptop hidden by question mark
42,000 Imposter Domains Used by Chinese Hackers in Huge Phishing Campaign

Thousands of imposter domains are being used in a massive brand impersonation phishing campaign.

By 
Digital illustration of trojan horse malware.
Is the Altruistics Trojan a Serious Threat? How to Remove It From Windows

If the Altruistics virus has gotten onto your PC, here's how it got there, how to get rid of it, and how to avoid Trojan attacks in the future

By 
black and white photo of trojan horse
What Is a Trojan Horse in Cybersecurity? How Does It Work?

Most people have heard of Trojan malware, but what is it? What are the most prevalent types? And how can you stay safe?

By 
harley quinn cosplay with a baseball bat
What Is Harly Malware on the Google Play Store?

This Trojan malware silently signs you up to expensive subscription services to empty your bank account. Here's what you need to know.

By 
graphic of horse in front of green matrix background
What Is a Trojan Dropper?

Most people have heard about Trojan horses, but what do you know about Trojan droppers? Here's what you need to know, including how to avoid them.

By 
Computer code on a screen with a hooded person
What Is the YTStealer Malware and What Does It Do?

This malware can steal your YouTube account and sell it on the dark web. Here's what you need to know about YTStealer malware.

By 
trojan-virus-android
How the Android.Spy.4498 Trojan Steals Your WhatsApp Data (and How to Beat It)

It imitates WhatsApp, so most users won't even know it's a Trojan.

By 
See more articles +