Trojan Horse or Virus – Do you know the difference?

They inherit names like Melissa, Thursday and Chernobyl, but what are they? These three were viruses. Another popular cyber warfare tactic is use of a trojan horse program.

Trojan horses operate by pretending to do one thing (obvious to the victim) while really doing something else (unknown to the victim). Trojan horses work because they send the victim a “gift” to keep the victim occupied while they perform their cyber terrorism.

A recent AOL trojan horse sent surfers an offer to log onto AOL for free but when he/she loaded the attachment, the program emailed the person’s password and log-on name to the hacker. A scarier trojan horse scheme debuted on CBS’ 60 Minutes several weeks ago and showed how hackers could obtain bank accounts and passwords using these programs. Hackers send the victim an email that appears to be from a bank where the victim just opened a bank account. The person receives an animated cartoon (obvious to the victim) and the trojan horse (unknown to the victim) that will email that person’s sensitive data to the hackers. Trojan horses usually go undetected by antivirus programs because they don’t operate like a virus.

Viruses, on the other hand, are destructive programs that act as harmless applications. They typically are loaded onto a person’s computer against his/her wishes and his/her knowledge. Simple viruses work by making a copy of themselves over and over until it uses all available memory. A more threatening virus can transmit itself across networks while bypassing networks. Antivirus programs can filter out most viruses except for the latest, greatest plague concocted by hackers. A worm is a virus that cannot attach itself to other programs but that does replicate itself and uses memory.

Avoid Trojan Horses And Viruses

Make it a habit not to open attachments sent to you by strangers. Just delete them – it’s safer.

Think twice before opening “junk” email from friends. They could already be a victim of a trojan horse.

Don’t open email from strangers. You never know when a harmless spam could be deadly for your computer.

Keep an eye on the latest cyber crimes by bookmarking this site.

You may like these other stories...

I am a recent MS Accounting degree graduate and I am looking into a programming/IT related career. Anyone here have experience or know any accountants that diverted their careers into IT/Programming/System design, etc?...
Event Date: May 29, 2014 In this presentation Excel expert David Ringstrom, CPA brings you up to speed on the Excel feature you should be using, but probably aren't. The Table feature offers the ability to both...
No field likes its buzzwords more than technology, and one of today's leading terms is "the cloud." But it's not just a matter of knowing what's fashionable. Accounting professionals who know how to use...

Upcoming CPE Webinars

Apr 24
In this session Excel expert David Ringstrom, CPA introduces you to a powerful but underutilized macro feature in Excel.
Apr 25
This material focuses on the principles of accounting for non-profit organizations' revenues. It will include discussions of revenue recognition for cash and non-cash contributions as well as other revenues commonly received by non-profit organizations.
Apr 30
During the second session of a four-part series on Individual Leadership, the focus will be on time management- a critical success factor for effective leadership. Each person has 24 hours of time to spend each day; the key is making wise investments and knowing what investments yield the greatest return.
May 1
This material focuses on the principles of accounting for non-profit organizations’ expenses. It will include discussions of functional expense categories, accounting for functional expenses and allocations of joint costs.