Trojan horse

(redirected from Trojan horses)
Also found in: Dictionary, Thesaurus, Financial, Encyclopedia.
Related to Trojan horses: Spyware, logic bomb

Trojan horse

1. Something that initially seems innocuous but is ultimately bad or malicious. A reference to the myth in which Ancient Greek soldiers hid inside a giant wooden horse in order to gain access to the city of Troy. That personable new hire turned out to be a Trojan horse—she stole our intellectual property and sold it to the competitor!
2. A computer program that appears to be useful or harmless but secretly installs malicious code or software onto the infected computer. We have malware on our computer because that game you downloaded turned out to be a Trojan horse.
See also: horse, Trojan

a Trojan horse

COMMON If you describe someone or something as a Trojan horse, you mean that they seem good or useful, but are really there to help something be harmed or destroyed in the future. Proposals for a golf course are now seen as a Trojan Horse for hotel and conference centres. This small reduction in the basic tax rate was merely a Trojan horse for the far more drastic cutting of the top rate from 70 to 28 per cent. Note: This refers to an ancient Greek story. The city of Troy was under siege from the Greeks. The Greeks built a large hollow wooden horse and left it secretly as a gift for the Trojans, who took it into the city. However, Greek soldiers were hiding inside the horse, and they were able to cause the destruction of the city.
See also: horse, Trojan

a Trojan horse

1 a person or device intended to undermine an enemy or bring about their downfall. 2 a program designed to breach the security of a computer system, especially by ostensibly functioning as part of a legitimate program, in order to erase, corrupt, or remove data.
In Greek mythology, the Trojan horse was a huge hollow wooden statue of a horse in which Greek soldiers concealed themselves in order secretly to enter and capture the city of Troy, an action which brought the ten-year siege of the city to an end.
See also: horse, Trojan

trojan horse

n. a kind of malicious software that arrives at a personal computer embedded in some other software and then introduces routines that can gather personal information or destroy the operationality of the computer. The consultant called the intruder a “trojan horse” and said I needed yet another program to get rid of it.
See also: horse, Trojan
References in periodicals archive ?
This Trojan horse was found in pirated software distributed via BitTorrent sites.
The Trojan Horse deception was the idea of the wily Odysseus, one of the Greek leaders.
Sophos's proactive technology was capable of detecting the Trojan horse (naming it as Troj/Haxdor-Fam), and is defending customers' computers without requiring ,an update.
Average Trojan horse installations per 100 scans: 9.
Webroot also witnessed a significant rise in Trojan horse infection rates with an increase to 29 percent, up from 24 percent during the fourth quarter of 2005.
Clicking on the link takes users to a website which invisibly installs a Trojan horse on the victim's computer.
The ICSTIS website reports that it has seen a significant rise in complaints from users who have received excessive phone bills having been hit by Trojan horses on their computers, which have taken over the modem connection of their PC to make calls to premium-rate numbers.
By employing Avinti's iSolation Server, which uses virtual machine technology to test suspicious e-mail attachments at the gateway, RFA can stop Trojan horses, spyware, key loggers and targeted attacks from stealing sensitive financial information.
BARCELONA, Spain -- The Combination of F-Secure's Mobile Anti-Virus and M-Systems' MegaSIM(R) Platform for High-Density SIM Cards is Set to Protect Mobile Subscribers from Viruses, Trojan Horses and Worms
Avinti protects e-mail systems from Trojan horses, spyware, key loggers, targeted attacks and similar types of fast-moving threats by proactively identifying malicious behavior.
Behavior-based security technology identifies online threats such as worms, viruses, Trojan horses, keystroke loggers, and phishing sites by their actions and characteristics.
Hubbard added, "These Trojan horses are moving beyond keylogging to now capture screenshots to obtain end-user credentials.
Gateway users will continue receiving all the benefits of Norton AntiVirus, the world's most trusted antivirus solution, which provides automatic protection against viruses, worms, and Trojan horses.
WholeSecurity provides customers with endpoint security that protects against zero-day attacks from a range of crimeware including worms, Trojan horses, keystroke loggers, and phishing attacks.
0 for Symbian protects Symbian OS-based Series 60 and Series 80 smartphones, such as the Nokia 9300 and 9500 enterprise devices, from network intrusions as well as from viruses, Trojan horses, and worms.