You are on page 1of 3

Trojan horse: Computer viruses 

typically attach to an executable host file,


which results in their viral codes executing when a file is opened. The code
then spreads from the document or software it is attached to via networks,
drives, file-sharing programs, or infected email attachments.. A Trojan horse
virus can often remain on a device for months without the user knowing their
computer has been infected. However, tell-tale signs of the presence of a
Trojan include computer settings suddenly changing, a loss in computer
performance, or unusual activity taking place. The best way to recognize a
Trojan is to search a device using a Trojan scanner or malware-removal
software. For example, a user might receive an email from someone they
know, which includes an attachment that also looks legitimate. However, the
attachment contains malicious code that executes and installs the Trojan on
their device. The user often will not know anything untoward has occurred, as
their computer may continue to work normally with no signs of it having been
infected. The malware will reside undetected until the user takes a certain
action, such as visiting a certain website or banking app. This will activate the
malicious code, and the Trojan will carry out the hacker’s desired action.
Depending on the type of Trojan and how it was created, the malware may
delete itself, return to being dormant, or remain active on the device. Trojans
can also attack and infect smartphones and tablets using a strand of mobile
malware. This could occur through the attacker redirecting traffic to a device
connected to a Wi-Fi network and then using it to launch cyber attacks
 Worm virus: A computer worm is a type of malware whose primary function
is to self-replicate and infect other computers while remaining active on
infected systems. A computer worm duplicates itself to spread to uninfected
computers. It often does this by exploiting parts of an operating system that are
automatic and invisible to the user. A computer worm duplicates itself to spread
to uninfected computers. It often does this by exploiting parts of an operating
system that are automatic and invisible to the user. A computer worm
duplicates itself to spread to uninfected computers. It often does this by
exploiting parts of an operating system that are automatic and invisible to the
user. A computer worm duplicates itself to spread to uninfected computers. It
often does this by exploiting parts of an operating system that are automatic and
invisible to the user. It is common for worms to be noticed only when their
uncontrolled replication consumes system resources, slowing or halting other
tasks A computer worm is not to be confused with WORM (write once, read
many) Computer worms often rely on the actions of, and vulnerabilities
in, networking protocols to propagate. After a computer worm loads and
begins running on a newly infected system, it will typically follow its
prime directive: to remain active on an infected system for as long as
possible and to spread to as many other vulnerable systems as
possible. There are several types of malicious computer worms: Email
worms work by creating and sending outbound messages to all the
addresses in a user's contact list. The messages include a malicious
executable file that infects the new system when the recipient opens it.
Successful email worms usually employ social
engineering and phishing techniques to encourage users to open the
attached file. Computer worms require user action to initially propagate,
such as clicking on a link, others can easily spread without user
interaction. All that's necessary is for the computer worm to become
active on an infected system. Before the widespread use of networks,
computer worms were spread through infected storage media, such
as floppy diskettes, which, when mounted on a system, would infect
other storage devices connected to the victim system Today, USB
drives are a common vector for computer worms, as are internet
activities such as email, chat and web surfing.

You might also like