Glossary Term

Trojan Horse

More About Plurilock


White Paper: Advanced Authentication

The state of authentication today—and why you need Plurilock products.

Plurilock Quad Chart

Quick, visual summaries of Plurilock value, use cases, architecture, and typical clients.

2019 Authentication Guide

Summary of authentication recommendations from major standards bodies, plus Plurilock’s own recommendations.

Behavioral Biometrics Guide

The definitive guide to behavioral biometrics, a core Plurilock technology.

A Trojan Horse is a malware attack in which users are fooled into installing malicious code on a computing system. Named from the Trojan War story of Greek subterfuge, in many cases a trojan horse attack involves software, code, or links that claim to offer desired functionality to a user but that also carries hidden software that performs illicit activity once installed.¶Ransomware, which locks a workstation and its data until a ransom is paid, and remote access trojans (RATs), which hide in the background to enable a remote attacker to easily take control of a workstation over the Internet, are both forms of trojan horse software. Another common form may capture a user's keystrokes, including usernames, passwords, and account data, and send these to a third party.

Stay informed. Join our low-volume list for news and updates.


Plurilock is the leader in advanced, risk-based authentication. We provide invisible, device-free MFA for corporate endpoints, Citrix sessions, cloud applications, and their users in finance, healthcare, education, and SaaS.



Contact Plurilock

Have a question or comment?