Download presentation
Presentation is loading. Please wait.
Published bySamuel Cobb Modified over 9 years ago
1
Trojan Attacks - presented by Leo October 28/2010
2
New Java trojan attacks Mac OS X via social networking sites Disguised as a video When being clicked, download and run installer automatically
3
What is Trojan? Purpose of creating trojan Distribution of trojan Ways to avoid being infected Conclusion
4
What is Trojan? City in ancient Greece? Malware that infect system
5
Purpose of creating trojan Get useful information Remote control
6
A devious trojan cause great loss to online bank accounts -maintained for 3 years -stole log-ons
7
Distribution of trojan Software downloads Bundling Email attachments Browsing malicious websites
8
Ways to avoid being infected Have good browsing habits Don ’ t download suspicious files Do have an anti-virus software installed Remedial measure
9
Conclusion Trojan is a malware It ’ s created to steal data Different ways of its distribution Ways to protect system
10
References: Primary: CNN http://arstechnica.com/apple/news/2010/10/new-java-trojan- attacks-mac-os-x-via-social-networking- sites.ars?utm_source=rss&utm_medium=rss&utm_campaign= rss http://arstechnica.com/apple/news/2010/10/new-java-trojan- attacks-mac-os-x-via-social-networking- sites.ars?utm_source=rss&utm_medium=rss&utm_campaign= rss Wikipedia, http://en.wikipedia.org/wiki/Trojan_horse_(computing) http://en.wikipedia.org/wiki/Trojan_horse_(computing) Itbusiness, http://www.itbusiness.ca/it/client/en/home/News.asp?id=5058 9 http://www.itbusiness.ca/it/client/en/home/News.asp?id=5058 9 Ehow, http://www.ehow.com/about_5436331_purpose-trojan- virus.htmlhttp://www.ehow.com/about_5436331_purpose-trojan- virus.html Privacy, http://www.2privacy.com/www/viruses/trojan- horses.htmlhttp://www.2privacy.com/www/viruses/trojan- horses.html
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.