The Trojan horse, also known as Trojan, in the context of computing and software, describes a class of computer threats (malware) that appears to perform a desirable function but in fact performs undisclosed malicious functions. These functions allow unauthorized access to the host computer, giving them the ability to save their files on the user’s computer or even watch the user’s screen and control the computer.

Trojan horses (not technically a virus) can be easily and unwittingly downloaded. For example, if a computer game is designed such that, when executed by the user, it opens a back door that allows a hacker to control the computer of the user, then the computer game is said to be a Trojan horse. However, if the computer game is legitimate, but was infected by a virus, then it is not a Trojan horse, regardless of what the virus may do when the game is executed. The term is derived from the classical story of the Trojan horse.

How Can You Detect Trojans? Check for Trojans with SpyHunter!

SpyHunter is a powerful malware remediation and protection tool designed to help provide PC users with in-depth system security analysis, detection and removal of a wide range of threats like Trojans as well as a one-on-one tech support service.

Download SpyHunter’s Malware Scanner
to Detect Trojans.
Note: SpyHunter's scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. To understand our policies, please review our EULA, Privacy Policy and Threat Assessment Criteria. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.

There are currently 3,612 articles listed on trojans.

Name Date
BrowserModifier:Win32/Diplugem December 29, 2015
BrowserModifier.KeenValue PerfectNav March 7, 2011
BrowserModifier.Matcash April 18, 2011
BrowserModifier.MSConfig.BHO August 22, 2012
BrowserModifier.Starsdoor October 9, 2009
Brushaloader February 25, 2019
BUBBLEWRAP Trojan April 12, 2019
Bugat February 12, 2010
Bundespolizei Ukash August 22, 2011
BURAN Ransomware June 5, 2019
Bushido Botnet November 1, 2018
Butler Miner Trojan May 18, 2018
CamuBot September 12, 2018
Caphaw September 30, 2014
Carbanak September 9, 2015
Carberp Trojan February 4, 2011
Cartoline.exe June 21, 2010
Cbbw88s.exe December 6, 2010
Celas Trojan May 22, 2012
CenterPOS February 9, 2016
China Chopper August 15, 2013
Chiznit June 1, 2012
Chthonic January 21, 2015
Cidrex February 8, 2012
Citadel Trojan January 27, 2012

Search by Letter:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9

Home >