ABOUT TROJANS
Nowadays there is an alarming number of
cyber-crooks on the Internet with high levels of expertise in the latest
digital fraud techniques. One of the favorite tools of these criminals is
the Trojan, which can silently infiltrate users' computers.
A common mistake is to think that your computer cannot
possibly be of
interest to Internet criminals. Have never used your
credit card number or
bank account details over the Web? Have you never used
any kind of online
service -where your bank details are available- to check
phone or
electricity bills? Doesn't your ISP have an area where
you can edit your
personal details?
Cyber-crooks know all about these things. They know
that the information
they want is within reach, and all they need is the right
tool to extract
it... the Trojan.
Trojans don't usually spread via email - as this is
not subtle enough. Often
they are hidden in programs downloaded from the Internet
or exploit a
vulnerability to infect computers simply when the unsuspecting
user visits a
website.
Unlike other viruses or worms -although there are exceptions-
Trojans don't
delete files, display silly texts or even send infected
emails.
Nevertheless, Trojans can steal all types of information,
or let an attacker
into your system, or even give someone else complete
control over your
computer.
Trojans can also be used to let hackers use your Internet
connection and
launch attacks from your computer. This means that the
victim of the attack
will think you are responsible, not the hacker. This
technique of using PCs
as 'zombies' can also link up several computers to make
it even more
difficult for the real source to be detected.
So to think that all you need to protect yourself from
today's Internet
threats is caution and common sense, is at best foolhardy.
There is no
substitute, if you really want to stay out of danger,
for a good, antivirus
updated at least once a day.
an article from Panda Software (http://www.pandasoftware.com)