Trojan horse computer viruses: in 2019, they were the most common form of computer viruses for both Windows (64% of all malware types) and macOS (60%). Suppose youβre a fan of Greek history or take a keen interest in protecting your devices. In that case, you probably have a fairly good idea of what they are and how they work. However, in this guide, we explore how you can protect yourself and keep your computing from being disrupted by one of the most dangerous threats in tech.
What are Trojan viruses?
Trojan viruses are malicious pieces of code that masquerade as legitimate programs. By posing as a regular piece of software, they gain entry to your computer, after which they perform the task they were designed for. This can include stealing your personal data, such as logins or files; recording what you type into your keyboard; downloading other pieces of malware; or allowing your device to be controlled remotely.
Trojan horse viruses are named after a wooden horse used by the Greeks in Virgil’s epic poem, the Aeneid. It details the war between Greece and Troy, which comes to an abrupt end when the Greeks, hiding inside a wooden horse accepted by the Trojans as a gift, open Troyβs gates to their army, resulting in the fall of the city-state.
How can computers get infected by Trojans?
Users are usually tricked into downloading Trojans onto their computers. They might pose as a legitimate file or program and enter the system once the user opens them. This can extend to email attachments or files sent over social media, links in text messages, torrented files, infected storage devices like pen drives, or links hidden in ads.
How to stop Trojans from getting onto your devices
Thankfully, there are plenty of ways to avoid a Trojan ending up on your system.
- Use a VPN β Virtual private networks keep your device safe by encrypting your internet connection, meaning you canβt be as easily hacked and infected with Trojan viruses. There are plenty available, and you can getΒ VPN software for many systems, such as Android, iOS, Windows, or macOS.
- Always scan β When using removable storage devices, always be sure to scan them before you start opening files.
- Invest in antivirus β If your antivirus software is strong and reactive, you can stop and quarantine Trojan code automatically before it affects your system.
- Be smart online β Links, attachments, downloads; most of the ways one can download a Trojan are down to human error, so if a site doesnβt look legitimate, be sure to shy away from it.
How to remove a Trojan
If you suspect a Trojan is on your device, you need to get rid of it ASAP. To do so, run a full scan on your device in offline mode to find the Trojan. If this doesnβt work and your computer is still behaving strangely, you may need to format your hard drive and reinstall your operating system β though you will probably lose files in the process.