Tuesday, November 22, 2005

Trojan Horse Placement

Blended threats work hard to satisfy their goals, and in doing so, they resort to many tried-and-true intrusion methods, including planting Trojan horses. These shadowy tools impersonate legitimate programs while delivering information or access from the victimized computer to a remote user(s).
Although major anti-virus programs protect against most Trojan horses, some blended threats plant them simply to bolster their chances of total domination on infected computers.
These methods represent major tactics used by blended threats, but by no means does this list cover them all. As threats continue to evolve, the number of techniques they use perpetually increases, and because blended threats use what works, we’re apt to see almost anything appear as a fiendish ingredient in the blended stew.


Post a Comment

<< Home