Trojan Attacks - presented by Leo October 28/2010.
-
Upload
samuel-cobb -
Category
Documents
-
view
215 -
download
3
Transcript of Trojan Attacks - presented by Leo October 28/2010.
Trojan Attacks -presented by Leo October 28/2010
New Java trojan attacks Mac OS X via social networking sites
Disguised as a video
When being clicked, download and run installer automatically
What is Trojan? Purpose of creating trojan Distribution of trojan Ways to avoid being infected Conclusion
What is Trojan?
City in ancient Greece?
Malware that infect system
Purpose of creating trojan
Get useful information
Remote control
A devious trojan cause great loss to online bank accounts
-maintained for 3 years
-stole log-ons
Distribution of trojan Software downloads
Bundling
Email attachments
Browsing malicious websites
Ways to avoid being infected
Have good browsing habits Don’t download suspicious files Do have an anti-virus software
installed Remedial measure
Conclusion
Trojan is a malware It’s created to steal data Different ways of its distribution Ways to protect system
References: Primary: CNN http://arstechnica.com/apple/news/2010/10/ne
w-java-trojan-attacks-mac-os-x-via-social-networking-sites.ars?utm_source=rss&utm_medium=rss&utm_campaign=rss
Wikipedia, http://en.wikipedia.org/wiki/Trojan_horse_(computing) Itbusiness, http://www.itbusiness.ca/it/client/en/home/News.asp?id
=50589 Ehow, http://www.ehow.com/about_5436331_purpose-trojan-virus.
html Privacy, http://www.2privacy.com/www/viruses/trojan-horses.html