Trojan Horse or Virus – Do you know the difference?

They inherit names like Melissa, Thursday and Chernobyl, but what are they? These three were viruses. Another popular cyber warfare tactic is use of a trojan horse program.

Trojan horses operate by pretending to do one thing (obvious to the victim) while really doing something else (unknown to the victim). Trojan horses work because they send the victim a “gift” to keep the victim occupied while they perform their cyber terrorism.

A recent AOL trojan horse sent surfers an offer to log onto AOL for free but when he/she loaded the attachment, the program emailed the person’s password and log-on name to the hacker. A scarier trojan horse scheme debuted on CBS’ 60 Minutes several weeks ago and showed how hackers could obtain bank accounts and passwords using these programs. Hackers send the victim an email that appears to be from a bank where the victim just opened a bank account. The person receives an animated cartoon (obvious to the victim) and the trojan horse (unknown to the victim) that will email that person’s sensitive data to the hackers. Trojan horses usually go undetected by antivirus programs because they don’t operate like a virus.

Viruses, on the other hand, are destructive programs that act as harmless applications. They typically are loaded onto a person’s computer against his/her wishes and his/her knowledge. Simple viruses work by making a copy of themselves over and over until it uses all available memory. A more threatening virus can transmit itself across networks while bypassing networks. Antivirus programs can filter out most viruses except for the latest, greatest plague concocted by hackers. A worm is a virus that cannot attach itself to other programs but that does replicate itself and uses memory.

Avoid Trojan Horses And Viruses

Make it a habit not to open attachments sent to you by strangers. Just delete them – it’s safer.

Think twice before opening “junk” email from friends. They could already be a victim of a trojan horse.

Don’t open email from strangers. You never know when a harmless spam could be deadly for your computer.

Keep an eye on the latest cyber crimes by bookmarking this site.

You may like these other stories...

Following other recent high-profile hacking events, investigators discovered yesterday that hackers broke into the draft work paper files of several famous CPA firms. Revealing images of the scantily clad documents have been...
For bitcoin users, the taxman cometh. And you best know how to calculate taxes owed on what the IRS calls convertible virtual currency.In March 2014, the IRS issued Notice 2014-21, which declares virtual currency will be...
Earlier this year I wrote about my mixed feelings on Excel for iPad's debut. My closing sentence for that article read "The early iterations of Microsoft products tend to have rough edges that get smoothed out with...

Already a member? log in here.

Upcoming CPE Webinars

Sep 18
In this course, Amber Setter will shine the light on different types of leadership behavior- an integral part of everyone's career.
Sep 24
In this jam-packed presentation Excel expert David Ringstrom, CPA will give you a crash-course in creating spreadsheet-based dashboards. A dashboard condenses large amounts of data into a compact space, yet enables the end user to easily drill down into details when warranted.
Sep 30
This webcast will include discussions of important issues in SSARS No. 19 and the current status of proposed changes by the Accounting and Review Services Committee in these statements.
Oct 23
Amber Setter will show the value of leadership assessments as tools for individual and organizational leadership development initiatives.