Trojan Horse or Virus – Do you know the difference?

They inherit names like Melissa, Thursday and Chernobyl, but what are they? These three were viruses. Another popular cyber warfare tactic is use of a trojan horse program.

Trojan horses operate by pretending to do one thing (obvious to the victim) while really doing something else (unknown to the victim). Trojan horses work because they send the victim a “gift” to keep the victim occupied while they perform their cyber terrorism.

A recent AOL trojan horse sent surfers an offer to log onto AOL for free but when he/she loaded the attachment, the program emailed the person’s password and log-on name to the hacker. A scarier trojan horse scheme debuted on CBS’ 60 Minutes several weeks ago and showed how hackers could obtain bank accounts and passwords using these programs. Hackers send the victim an email that appears to be from a bank where the victim just opened a bank account. The person receives an animated cartoon (obvious to the victim) and the trojan horse (unknown to the victim) that will email that person’s sensitive data to the hackers. Trojan horses usually go undetected by antivirus programs because they don’t operate like a virus.

Viruses, on the other hand, are destructive programs that act as harmless applications. They typically are loaded onto a person’s computer against his/her wishes and his/her knowledge. Simple viruses work by making a copy of themselves over and over until it uses all available memory. A more threatening virus can transmit itself across networks while bypassing networks. Antivirus programs can filter out most viruses except for the latest, greatest plague concocted by hackers. A worm is a virus that cannot attach itself to other programs but that does replicate itself and uses memory.

Avoid Trojan Horses And Viruses

Make it a habit not to open attachments sent to you by strangers. Just delete them – it’s safer.

Think twice before opening “junk” email from friends. They could already be a victim of a trojan horse.

Don’t open email from strangers. You never know when a harmless spam could be deadly for your computer.

Keep an eye on the latest cyber crimes by bookmarking this site.

You may like these other stories...

How are you planning? What tools do you use (or fail to use) for forecasting? PlanGuru is a business budgeting, forecasting, and performance review software company based in White Plains, N.Y. AccountingWEB recently spoke...
Event Date: October 30, 2014, 2 pm ETMany Excel users have a love-hate relationship with workbook links. For the uninitiated, workbook links allow you to connect one Microsoft Excel spreadsheet to other spreadsheets, Word...
Event Date: September 9, 2014, 2:00 pm ETIn this session we'll discuss the types of technologies and their uses in a small accounting firm office. Included will be:The networked office: connecting everything together for...

Already a member? log in here.

Upcoming CPE Webinars

Aug 21
Meet budgets and client expectations using project management skills geared toward the unique challenges faced by CPAs. Kristen Rampe will share how knowing the keys to structuring and executing a successful project can make the difference between success and repeated failures.
Aug 26
This webcast will include discussions of recently issued, commonly-applicable Accounting Standards Updates for non-public, non-governmental entities.
Aug 28
Excel spreadsheets are often akin to the American Wild West, where users can input anything they want into any worksheet cell. Excel's Data Validation feature allows you to restrict user inputs to selected choices, but there are many nuances to the feature that often trip users up.
Sep 9
In this session we'll discuss the types of technologies and their uses in a small accounting firm office.