Trojan horse Generic

  • Rank this week: Nº 1
  • Websites affected: 132
  • Users affected: 10,000,000 - 50,000,000
  • Affected Operating Systems: All Windows OS
Trojan horse Generic Summary

Trojan horse Generic is a malicious application that allows hackers to remotely access your computer system letting them modify files, steal personal information and install more unwanted software. These kinds of threats, called Trojan horse, must be sent to you by someone or carried by another program. They may also arrive thanks to unwanted downloads on infected websites or installed with online games or other internet-driven applications. Most Trojan horses can be detected and removed by AVG.

Trojan malware takes its name from the classical story of the Trojan horse, because it imitates the technique to infect computers. A Trojan will hide within seemingly harmless programs, or will try to trick you into installing it.
Common things that a Trojan Horse may do include:
- Creating backdoors: Trojans typically makes changes to your security system so that other malware or even a hacker can get in.
- Spying: some Trojans are essentially Spyware designed to wait until you access your online accounts or enter your credit card details, and then send your passwords and other data back to their master.
- Turn your computer into a Zombie! sometimes, a hacker isn't interested in you, but just wants to use your computer as a slave in a network under his or her control.
- Send costly SMS messages: even smartphones get Trojans, and the most common way for criminals to make money is by using them to make your phone send costly SMS messages to premium numbers.
The only way to really stay protected or remove an infection is by using anti-malware software, more commonly called an antivirus. The best malware removal tools are included in the most advanced antivirus, like AVG Internet Security has all you need to stay safe from the most common threats.
For one-on-one virus removal you can contact our AVG Virus Removal Service experts, available 24/7, to solve your device's virus problems for you. Get help now.
Avoid opening unknown files attached to email. These have extensions such as .exe, .vbs, and .bat. Maintain up-to-date antivirus protection, preferrably with a firewall.
How can I prevent a Trojan Horse
- Always be careful when surfing the web
- Avoid downloading programs from unknown sources
- Do not open email attachements from sources you do not know
- Only download programs/or apps from official places

 

More Trends and Statistics for Trojan horse Generic

Websites affected

The following is a list of domains that caused the greatest percentage of global detections during the last 7 days.

Timeline Detection Stats

The timeline shows the evolution of aggregate threat detections during the last 8 days. The individual view shows the most prevalent threat types individually.

Worldwide Virus Detections

Check File for Viruses

Is a file safe? Upload it and check it!

Leave a comment