Glossary Term

Trojan Horse

A Trojan Horse is a malware attack in which users are fooled into installing malicious code on a computing system.

Named from the Trojan War story of Greek subterfuge, in many cases a trojan horse attack involves software, code, or links that claim to offer desired functionality to a user but that also carries hidden software that performs illicit activity once installed.

Ransomware, which locks a workstation and its data until a ransom is paid, and remote access trojans (RATs), which hide in the background to enable a remote attacker to easily take control of a workstation over the Internet, are both forms of trojan horse software. Another common form may capture a user's keystrokes, including usernames, passwords, and account data, and send these to a third party.

2FA/MFA Rapid Reference

Authentication at a glance

Download the 2FA/MFA Rapid Reference now:

  • 2FA and MFA basics and common solutions
  • The benefits and drawbacks of each
  • Glossary of authentication terms

 

2FA/MFA Rapid Reference

  • 2FA and MFA basics and common solutions
  • The benefits and drawbacks of each
  • Glossary of authentication terms
Save PDF  

MORE DOWNLOADABLE REFERENCES

PDF

2020 Authentication Guide

Summary of authentication recommendations from major standards bodies, plus Plurilock’s own recommendations.
PDF

White Paper: Advanced Authentication

The state of authentication today—and why you need Plurilock products.
PDF

Understanding MFA vs. Privacy

Is multi-factor authentication always good for privacy? See why it isn't, and which strategies make the grade.
PDF

Behavioral Biometrics Guide

The definitive guide to behavioral biometrics, a core Plurilock technology.