by Albert Bustos
As an efficient clinician, the last thing you need are major interruptions. Sure, there are inevitable “quick fix” circumstances that stray you from tasks at hand, but you can deal with that. What you cannot afford is a crippling computer virus that stops your productivity to a grinding halt.
Enter
Trojan, or Trojan Horse -- a
malicious computer program that performs actions without your consent or
knowledge. These actions can consist of automatically deleting, blocking, modifying and copying
data, spreading additional malicious programs and launching an attack on other
computers. A Trojan infection is catastrophic to your workflow because it offers multiple ways of damaging your computer.
How do they get in and how can you protect yourself?
Trojans
commonly infect your machine through email attachments and internet downloads.
Once a program containing a Trojan is ran, your system is infected. Trojans
disguise themselves as harmless programs, but can severely immobilize your
system depending on its type.
Trojan
horses assist hackers by turning your computer into a “zombie.” It gives them
access to your credit cards, lets them install more malware and capture your
key strokes. It is also possible for other hackers to control your computer
simply by searching for computers already infected with a Trojan horse.
This is the paragraph I would normally insert
a quick “virus symptoms” rundown, but I’ll refrain because I’d rather be
thorough. Various Trojan Horses serve different purposes, so for a detailed
list of types and actions, check out the list after the tips.
Protect Yourself
Trojans cannot infect without a form of user
interaction so education is key to prevention. Fortunately, as with other
computer viruses, there are ways you can prevent an infection. Here are seven
rational and technical tips to make sure Trojans remain unwelcomed.
Tip #1
If you’re at work, do not download non-work
related programs. Hackers will disguise Trojans as harmless programs for you to
download. The second you open the program your computer is infected. If
you do need to download a program, contact your IT department for
assistance.
Tip #2
Install a good firewall to protect your
Internet connection.
Tip #3
Install a good anti-virus program and update
its database on a regular basis.
Tip #4
Protect your browser with security add-ons
like HTTPS everywhere, NoScript, and Web of Trust (WOT).
Tip #5
Download files and applications from trusted
sources and scan executable files using your anti-virus programs
Tip #6
Read your email in plain text mode, if
possible to prevent a Trojan from sneaking into your system from a loaded image
and/or video
Tip #7
Recognize suspicious emails from unknown
sources. Most likely, Brad didn’t see your profile and wants you to “click here”
to respond. And, I think it’s doubtful someone a gazillion miles away wants to
transfer $8 million to your account; you probably don’t need the details.
Virus Trojan Types and their Purpose
Backdoor
A backdoor Trojan gives
malicious users remote control over the infected computer. They enable the
author to do anything they wish on the infected computer – including sending,
receiving, launching, and deleting files, displaying data, and rebooting the computer. Backdoor
Trojans are often used to unite a group of victim computers to form a botnet or
zombie network that can be used for criminal purposes.
Exploit
Exploits are programs that contain data or code that takes advantage of a vulnerability within application software that’s running on your computer.
Exploits are programs that contain data or code that takes advantage of a vulnerability within application software that’s running on your computer.
Rootkit
Rootkits are designed to conceal certain objects or activities in your system. Often, their main purpose is to prevent malicious programs being detected – in order to extend the period in which programs can run on an infected computer.
Rootkits are designed to conceal certain objects or activities in your system. Often, their main purpose is to prevent malicious programs being detected – in order to extend the period in which programs can run on an infected computer.
Trojan-Banker
Trojan-Banker programs are designed to steal your account data for online banking systems, e-payment systems and credit or debit cards.
Trojan-Banker programs are designed to steal your account data for online banking systems, e-payment systems and credit or debit cards.
Trojan-DDoS
These programs conduct DoS (Denial of Service) attacks against a targeted web address. By sending multiple requests – from your computer and several other infected computers – the attack can overwhelm the target address…leading to a denial of service.
These programs conduct DoS (Denial of Service) attacks against a targeted web address. By sending multiple requests – from your computer and several other infected computers – the attack can overwhelm the target address…leading to a denial of service.
Trojan-Downloader
Trojan-Downloaders can download and install new versions of malicious programs onto your computer – including Trojans and adware.
Trojan-Downloaders can download and install new versions of malicious programs onto your computer – including Trojans and adware.
Trojan-Dropper
These programs are used by hackers in order to install Trojans and / or viruses – or to prevent the detection of malicious programs. Not all antivirus programs are capable of scanning all of the components inside this type of Trojan.
These programs are used by hackers in order to install Trojans and / or viruses – or to prevent the detection of malicious programs. Not all antivirus programs are capable of scanning all of the components inside this type of Trojan.
Trojan-FakeAV
Trojan-FakeAV programs simulate the activity of antivirus software. They are designed to extort money from you – in return for the detection and removal of threats…even though the threats that they report are actually non-existent.
Trojan-FakeAV programs simulate the activity of antivirus software. They are designed to extort money from you – in return for the detection and removal of threats…even though the threats that they report are actually non-existent.
Trojan-IM
Trojan-IM programs steal your logins and passwords for instant messaging programs – such as ICQ, MSN Messenger, AOL Instant Messenger, Yahoo Pager, Skype and many more.
Trojan-IM programs steal your logins and passwords for instant messaging programs – such as ICQ, MSN Messenger, AOL Instant Messenger, Yahoo Pager, Skype and many more.
Trojan-Ransom
This type of Trojan can modify data on your computer so that your computer doesn’t run correctly or you can no longer use specific data. The criminal will only restore your computer’s performance or unblock your data, after you have paid them the ransom money that they demand.
This type of Trojan can modify data on your computer so that your computer doesn’t run correctly or you can no longer use specific data. The criminal will only restore your computer’s performance or unblock your data, after you have paid them the ransom money that they demand.
Trojan-SMS
These programs can cost you money by sending text messages from your mobile device to premium rate phone numbers.
These programs can cost you money by sending text messages from your mobile device to premium rate phone numbers.
Trojan-Spy
Trojan-Spy programs can spy on how you’re using your computer. For example, tracking the data you enter via your keyboard, taking screen shots or getting a list of running applications.
Trojan-Spy programs can spy on how you’re using your computer. For example, tracking the data you enter via your keyboard, taking screen shots or getting a list of running applications.
Trojan-Mailfinder
These programs can harvest email addresses from your computer.
Read this far? Great. Share it with others and help them be Trojan virus free!
These programs can harvest email addresses from your computer.
Read this far? Great. Share it with others and help them be Trojan virus free!
No comments:
Post a Comment