What is a trojan horse in cybersecurity?

Cybersecurity Fundamentals Medium

Cybersecurity Fundamentals — Medium

What is a trojan horse in cybersecurity?

Key points

  • Trojans deceive users by posing as harmless software
  • They do not replicate themselves like viruses
  • Trojans do not require software vulnerabilities to spread

Ready to go further?

Related questions