targeted Trojan horse

targeted Trojan horse
A Trojan horse program sent as an attachment in an e-mail message that has a subject line, body text, and return address that have been crafted to fool the recipient into opening the attachment. Also: targeted Trojan, targeted Trojan spoofing.
Example Citations:
The Trojan horse attack, in which an e-mailed attachment — like the Trojan horse of Greek myth — looks innocuous but conceals a dangerous cargo, has been an all-too-familiar part of the computer landscape for decades. In recent years, however, a new and ever more prominent feature in that landscape has been the targeted Trojan, in which the e-mail subject line or message contains language calculated to lure a particular recipient into opening the attachment. Increasingly, targeted Trojan horses are being used to steal proprietary information, obtain intelligence to get an edge on rivals, and even, it seems, obtain access to sensitive military data.
— Lauren Aaronson, "For Love of Money," IEEE Spectrum, November 1, 2005
Banks, too, need to put in similar monitoring systems to score every single activity for risk, particularly at a time when phishing, pharming and targeted Trojan attacks are becoming more common, he says.
— Jaikumar Vijayan, "Banks urged to look at stronger security," Computerworld, November 7, 2005
Earliest Citation:
Before you run to the data center to unplug your mail server, let me assure you there are ways to fight targeted Trojan spoofing.
— Jonathan Feldman, "The IT Agenda: Battling Targeted Trojan Spoofing," Network Computer, July 22, 2004
A Trojan horse is a seemingly benign program that contains malicious code designed to steal or destroy data.
Related Words: Categories:

New words. 2013.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Zeus (trojan horse) — Zbot redirects here. For the action figures, see Zbots. For other uses, see Zeus (disambiguation). Zeus is a Trojan horse that steals banking information by keystroke logging and Form Grabbing. Zeus is spread mainly through drive by downloads and …   Wikipedia

  • Beast Trojan (trojan horse) — Infobox Software name = Beast Trojan|website = No caption = screenshot of the Beast RAT developer = Tataye operating system = Microsoft Windows latest release version = 2.07 latest release date = August 3, 2004 genre = remote administration,… …   Wikipedia

  • Trojan — /troh jeuhn/, adj. 1. of or pertaining to ancient Troy or its inhabitants. n. 2. a native or inhabitant of Troy. 3. a person who shows pluck, determination, or energy: to work like a Trojan. [bef. 900; ME; OE Troian < L Trojanus, equiv. to… …   Universalium

  • ransomware — n. Malicious software that encrypts a person s computer files and demands a ransom to decrypt the files. Example Citations: A new trojan that holds computer files hostage and then then demands a $US300 ($410) ransom for their safe return has been …   New words

  • puddle phishing — pp. Phishing that is targeted at a small company. puddle phishing adj. Example Citations: Scary statistics about Internet security were the subject of another speaker, David Culbertson, vice president, research and development, for Computer… …   New words

  • Friends and Family virus — n. A computer virus that infects a machine and then replicates by e mailing copies of itself to people in the user s address book. Example Citation: Trojan worms resort to all sorts of unusual and clever tactics to persuade users to activate them …   New words

  • digital pathogen — n. A computer virus, worm, Trojan horse or other software that causes harm to computers, electronic devices, or networks. Example Citations: Digital pathogens spread so quickly, however, that even the most diligent patchers could be at risk. At a …   New words

  • spear-phishing — pp. Phishing targeted at a specific person, usually by sending an e mail message crafted to appear as though it was sent by someone known to the recipient. Also: spear phishing, spearphishing. spear phish v. spear phish n. spear phisher n.… …   New words

  • logic bomb — n. A computer virus set for a timed release. When the virus detonates, it deliberately disrupts, modifies, or erases data. Example Citation: Omega Engineering learned firsthand the dangers of the disgruntled employee after a timed virus, known as …   New words

  • crimeware — n. Software that facilitates identity theft, phishing, or similar criminal activity. Example Citations: Norton Confidential, due to be released in October takes traditional anti virus and firewall software a step further, aiming to put itself… …   New words

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”