The Trojan horse, also known as Trojan, in the context of computing and software, describes a class of computer threats (malware) that appears to perform a desirable function but in fact performs undisclosed malicious functions. These functions allow unauthorized access to the host computer, giving them the ability to save their files on the user’s computer or even watch the user’s screen and control the computer.

Trojan horses (not technically a virus) can be easily and unwittingly downloaded. For example, if a computer game is designed such that, when executed by the user, it opens a back door that allows a hacker to control the computer of the user, then the computer game is said to be a Trojan horse. However, if the computer game is legitimate, but was infected by a virus, then it is not a Trojan horse, regardless of what the virus may do when the game is executed. The term is derived from the classical story of the Trojan horse.

How Can You Detect Trojans? Check for Trojans with SpyHunter!

SpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like Trojans as well as a one-on-one tech support service.

Download SpyHunter’s Malware Scanner
to Detect Trojans.
Note: SpyHunter's scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. To understand our policies, please review our EULA, Privacy Policy and Threat Assessment Criteria. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.

There are currently 3,612 articles listed on trojans.

Name Date
Bagoox October 19, 2015
Banker.Fox.A May 11, 2009
Banker.MSIL.MultiPhishing.gen February 14, 2012
Banload Trojan August 26, 2011
Bartalex July 23, 2015
BDS/Andromeda.EB.6 November 22, 2012
BDS/Zaccess.W August 20, 2012
BDS/ZeroAccess.Gen September 26, 2012
Bedep February 20, 2015
Beebone February 13, 2013
Beendoor April 22, 2019
Bholog.B Trojan July 27, 2015
Bicololo June 10, 2013
Bitcoin Collector Scam May 28, 2019
BKDR_AGENT.BCSG June 29, 2012
BKDR_LIFTOH.AD October 21, 2013
BKDR_MECIV.LIN March 1, 2012
BKDR_SYKIPOT.AG September 16, 2013
BlackEnergy May 15, 2019
BlackMoon July 22, 2016
BlackNix RAT April 17, 2018
BlackShades June 25, 2012
Bloodhound.Exploit.213 July 16, 2009
Bloodhound.Exploit.229 June 18, 2010
Bloodhound.Exploit.262 July 23, 2009
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 145

Search by Letter:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9

Home >