{"id":151174,"date":"2021-04-11T15:54:55","date_gmt":"2021-04-11T22:54:55","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=151174"},"modified":"2022-07-17T16:21:16","modified_gmt":"2022-07-17T23:21:16","slug":"what-is-a-trojan","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/","title":{"rendered":"What Is a Trojan?"},"content":{"rendered":"<p><span data-contrast=\"auto\">You may vaguely remember reading Virgil\u2019s epic poem \u201cAeneid\u201d back when you were in school. The story of Odysseus and his cunning plan to hide his <\/span><span data-contrast=\"auto\">Greek<\/span><span data-contrast=\"auto\"> soldiers inside a giant <\/span><span data-contrast=\"auto\">wooden horse<\/span><span data-contrast=\"auto\"> to have the Trojans bring his men inside the <\/span><span data-contrast=\"auto\">city of Troy<\/span><span data-contrast=\"auto\"> is hard to forget!\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In some ways, we might even view the <\/span><span data-contrast=\"auto\">Greeks<\/span><span data-contrast=\"auto\"> as the first <\/span><span data-contrast=\"auto\">hackers<\/span><span data-contrast=\"auto\"> in history, as their brilliant deception led directly to the fall of <\/span><span data-contrast=\"auto\">Troy<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Unfortunately, <\/span><span data-contrast=\"auto\">Trojan malware<\/span><span data-contrast=\"auto\"> works just like that old <\/span><span data-contrast=\"auto\">wooden horse<\/span><span data-contrast=\"auto\">: It hides damaging software inside what appears to be benign programs. Then, unsuspecting users are tricked by <\/span><span data-contrast=\"auto\">social engineering<\/span><span data-contrast=\"auto\"> tactics that can lead to an <\/span><span data-contrast=\"auto\">infected computer<\/span><span data-contrast=\"auto\"> or device.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">While these <\/span><span data-contrast=\"auto\">malicious programs<\/span><span data-contrast=\"auto\"> aren\u2019t technically <\/span><span data-contrast=\"auto\">computer viruses<\/span><span data-contrast=\"auto\">, the phrase \u201cTrojan virus\u201d is not uncommon and is often used to refer to <\/span><span data-contrast=\"auto\">spyware<\/span><span data-contrast=\"auto\"> that has detected and manipulated a system\u2019s <\/span><span data-contrast=\"auto\">vulnerabilities<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Take heart, however! Unlike the original citizens of <\/span><span data-contrast=\"auto\">Troy<\/span><span data-contrast=\"auto\">, you can educate yourself on the different <\/span><span data-contrast=\"auto\">types of Trojan horse<\/span><span data-contrast=\"auto\"> and protect your <\/span><span data-contrast=\"auto\">account information<\/span><span data-contrast=\"auto\"> from <\/span><span data-contrast=\"auto\">cybercriminals<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Read on to find out how to keep your <\/span><span data-contrast=\"auto\">computer system<\/span><span data-contrast=\"auto\"> and <\/span><span data-contrast=\"auto\">mobile devices<\/span><span data-contrast=\"auto\"> free of unwanted \u201cguests\u201d in disguise.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"auto\">Trojan: virus or <\/span><\/b><b><span data-contrast=\"auto\">malware<\/span><\/b><b><span data-contrast=\"auto\">?<\/span><\/b><\/h2>\n<p><span data-contrast=\"auto\">Although they can be easily confused in everyday lingo, Trojans aren\u2019t actually the same as a worm or a virus. Strictly speaking, a <\/span><span data-contrast=\"auto\">computer virus<\/span><span data-contrast=\"auto\"> works to infect files the same way a biological virus does: by self-replicating at an alarming rate and attaching itself over and over to various new programs.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Worms work in much the same way but don\u2019t require programs to attach to and spread.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Also frequently confused with Trojans is potentially unwanted programs (PUPs) and <\/span><span data-contrast=\"auto\">adware<\/span><span data-contrast=\"auto\">. PUPs are generally part of a software package that has been purchased and that program authors have included as a way to connect users to market affiliates.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Adware<\/span><span data-contrast=\"auto\"> differs from Trojans in that it doesn\u2019t hide its motives and usually results in little more than some additional programs appearing on your <\/span><span data-contrast=\"auto\">hard drive<\/span><span data-contrast=\"auto\"> that you might not have actively planned for.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p aria-level=\"3\"><b><span data-contrast=\"none\">How do Trojans work?<\/span><\/b><\/p>\n<p><span data-contrast=\"auto\">Thinking back to Virgil\u2019s epic poem \u201cAeneid,\u201d Trojans act like the <\/span><span data-contrast=\"auto\">wooden horse<\/span><span data-contrast=\"auto\"> \u2014 in that they hide all sorts of ways for <\/span><span data-contrast=\"auto\">malware<\/span><span data-contrast=\"auto\"> to be delivered to your <\/span><span data-contrast=\"auto\">computer system<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Trojans can act as a tool useful in other computer activities, a communication point for <\/span><span data-contrast=\"auto\">hackers<\/span><span data-contrast=\"auto\"> to access information, or as freestanding <\/span><span data-contrast=\"auto\">malware<\/span><span data-contrast=\"auto\">. Essentially, Trojan attacks are blanket attacks where a <\/span><span data-contrast=\"auto\">hacker<\/span><span data-contrast=\"auto\"> can insert any amount of different threats, from <\/span><span data-contrast=\"auto\">spyware<\/span><span data-contrast=\"auto\"> to <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/fighting-new-ransomware-techniques-with-mcafees-latest-innovations\/?hilite=%27ransomware%27\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">ransomware<\/span><\/a><span data-contrast=\"auto\"> and everything in between.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">One of the things that make Trojans so malicious is that they can take so many different paths to your <\/span><span data-contrast=\"auto\">sensitive data<\/span><span data-contrast=\"auto\">. Here are a few common ways that Trojans can cause problems:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"Poppins\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Infecting a legitimate website with <\/span><span data-contrast=\"auto\">malicious code<\/span><span data-contrast=\"auto\"> that then gets transferred to that website\u2019s unsuspecting visitors<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u25cf\" data-font=\"Poppins\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Infiltrating a <\/span><span data-contrast=\"auto\">computer system<\/span><span data-contrast=\"auto\"> via a program whose publisher is unauthorized or unknown<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u25cf\" data-font=\"Poppins\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Utilizing <\/span><span data-contrast=\"auto\">phishing<\/span><span data-contrast=\"auto\"> or <\/span><span data-contrast=\"auto\">social engineering<\/span><span data-contrast=\"auto\"> techniques to trick users into opening infected <\/span><span data-contrast=\"auto\">text messages<\/span><span data-contrast=\"auto\">, <\/span><span data-contrast=\"auto\">email attachments<\/span><span data-contrast=\"auto\">, or malicious websites<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u25cf\" data-font=\"Poppins\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Using drive-by downloads (unintentional downloads) posed as helpful software or prompting users to click on an audio stream or video connected to <\/span><span data-contrast=\"auto\">malicious code<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u25cf\" data-font=\"Poppins\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Being installed by <\/span><span data-contrast=\"auto\">hackers<\/span><span data-contrast=\"auto\"> who have used software <\/span><span data-contrast=\"auto\">vulnerabilities<\/span><span data-contrast=\"auto\"> to gain unauthorized access to a network<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2 aria-level=\"2\"><b><span data-contrast=\"auto\">10<\/span><\/b> <b><span data-contrast=\"auto\">common types of Trojans<\/span><\/b><\/h2>\n<p><span data-contrast=\"auto\">All Trojan attacks are not created equally. As the Swiss Army knife of <\/span><span data-contrast=\"auto\">malicious programs<\/span><span data-contrast=\"auto\">, Trojans can take many unpredictable forms and patterns.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Here are 10 of the most commonly experienced Trojans.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Backdoor Trojans<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">As the name implies, <\/span><span data-contrast=\"auto\">backdoor Trojans<\/span><span data-contrast=\"auto\"> gain <\/span><span data-contrast=\"auto\">remote access<\/span><span data-contrast=\"auto\"> to a <\/span><span data-contrast=\"auto\">computer system<\/span><span data-contrast=\"auto\"> via a \u201c<\/span><span data-contrast=\"auto\">backdoor<\/span><span data-contrast=\"auto\">\u201d in a current network or program. Once the Trojan is in, malicious actors can make your device part of a <\/span><span data-contrast=\"auto\">botnet<\/span><span data-contrast=\"auto\"> that links multiple host computers.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In the meantime, <\/span><span data-contrast=\"auto\">hackers<\/span><span data-contrast=\"auto\"> can reboot your computer, steal information, and upload more <\/span><span data-contrast=\"auto\">malware<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Banking Trojans<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">Banking Trojans<\/span><span data-contrast=\"auto\"> trick users into entering their login credentials for financial institutions and other money transactions. Because we\u2019re all used to entering our <\/span><span data-contrast=\"auto\">credit card<\/span><span data-contrast=\"auto\"> information at the drop of a hat now, <\/span><span data-contrast=\"auto\">banking Trojans<\/span><span data-contrast=\"auto\"> are extremely widespread.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Banking Trojans<\/span><span data-contrast=\"auto\"> make use of typical <\/span><span data-contrast=\"auto\">phishing<\/span><span data-contrast=\"auto\"> strategies, such as sending users clickbait that leads them to poser webpages where they\u2019re asked to enter their banking credentials.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Distributed denial of service<\/span><\/b><b><span data-contrast=\"none\"> (<\/span><\/b><b><span data-contrast=\"none\">DDoS<\/span><\/b><b><span data-contrast=\"none\">) Trojans<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">DDoS attacks<\/span><span data-contrast=\"auto\"> rely on a <\/span><span data-contrast=\"auto\">botnet<\/span><span data-contrast=\"auto\"> of zombie computers that can bombard servers and networks with huge throughputs of data. These throughputs overload existing systems, disable their dominant software, and allow remote operators to gain control.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">DDoS attacks<\/span><span data-contrast=\"auto\"> can be difficult to recognize at first because zombie computers, by and large, appear to be running normally on the surface. In most cases, the <\/span><span data-contrast=\"auto\">botnet<\/span><span data-contrast=\"auto\"> is set up via <\/span><span data-contrast=\"auto\">backdoor Trojans<\/span><span data-contrast=\"auto\"> that slumber undetected within the <\/span><span data-contrast=\"auto\">computer system<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Downloader Trojans<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">Whenever a computer has already become infected by <\/span><span data-contrast=\"auto\">malware<\/span><span data-contrast=\"auto\">, <\/span><span data-contrast=\"auto\">downloader Trojans<\/span><span data-contrast=\"auto\"> are designed to install even more unauthorized programs on it. <\/span><span data-contrast=\"auto\">Downloader Trojans<\/span><span data-contrast=\"auto\"> may add anything from different <\/span><span data-contrast=\"auto\">types of malware<\/span><span data-contrast=\"auto\"> like <\/span><span data-contrast=\"auto\">adware<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Game-thief<\/span><\/b><b><span data-contrast=\"none\"> Trojans<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">Gamers<\/span><span data-contrast=\"auto\">, beware! <\/span><span data-contrast=\"auto\">Game-thief<\/span><span data-contrast=\"auto\"> Trojans are specifically designed to hack user and login information from those <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/5-online-gaming-tips-to-stay-safe-from-hackers\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">playing online games<\/span><\/a><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">These Trojans may function in a <\/span><span data-contrast=\"auto\">backdoor<\/span><span data-contrast=\"auto\"> manner or act like ads within the games themselves that appear harmless but are <\/span><span data-contrast=\"auto\">phishing<\/span><span data-contrast=\"auto\"> for information to steal.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Mailfinder<\/span><\/b><b><span data-contrast=\"none\"> Trojans<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Mailfinder<\/span><span data-contrast=\"auto\"> Trojans seek to harvest any and all email addresses you may have stored on your <\/span><span data-contrast=\"auto\">computer system<\/span><span data-contrast=\"auto\"> or <\/span><span data-contrast=\"auto\">smartphone<\/span><span data-contrast=\"auto\">. Once gathered, these addresses are sent to malicious actors who can use them to send spam and <\/span><span data-contrast=\"auto\">malware<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Ransomware<\/span><\/b><b><span data-contrast=\"none\"> Trojans<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">Ransomware<\/span><span data-contrast=\"auto\"> Trojans first inhibit or damage your <\/span><span data-contrast=\"auto\">computer system<\/span><span data-contrast=\"auto\"> and then ask you for money to undo the damage. The important thing to remember here, though, is never to pay ransoms for any performance failures you\u2019re experiencing with your computer \u2014 this can further expose your banking information to <\/span><span data-contrast=\"auto\">cybercriminals<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Rootkit<\/span><\/b><b><span data-contrast=\"none\"> Trojans<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559738&quot;:320,&quot;335559739&quot;:80,&quot;335559740&quot;:276}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">Rootkit<\/span><span data-contrast=\"auto\"> Trojans act very much like camouflage for <\/span><span data-contrast=\"auto\">malicious code<\/span><span data-contrast=\"auto\">, hiding and concealing unauthorized programs within a <\/span><span data-contrast=\"auto\">computer system<\/span><span data-contrast=\"auto\">. The entire purpose of a <\/span><span data-contrast=\"auto\">rootkit<\/span><span data-contrast=\"auto\"> Trojan is to prevent users from detecting <\/span><span data-contrast=\"auto\">malware<\/span><span data-contrast=\"auto\"> so it can remain on a given computer for as long as possible.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Remote Access<\/span><\/b><b><span data-contrast=\"none\"> Trojans<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">Much like the <\/span><span data-contrast=\"auto\">backdoor Trojan<\/span><span data-contrast=\"auto\">, <\/span><span data-contrast=\"auto\">remote access<\/span><span data-contrast=\"auto\"> Trojans enter your <\/span><span data-contrast=\"auto\">computer system<\/span><span data-contrast=\"auto\"> via <\/span><span data-contrast=\"auto\">remote access<\/span><span data-contrast=\"auto\"> over a controlled network. Malicious actors can then spy on users, steal <\/span><span data-contrast=\"auto\">sensitive data<\/span><span data-contrast=\"auto\">, and disrupt or manipulate normal software activity.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">SMS Trojans<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">You might think short message service (SMS) is an artifact from a previous age, but <\/span><span data-contrast=\"auto\">SMS Trojans<\/span><span data-contrast=\"auto\"> are still out there sending mass messages to costly numbers.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"auto\">5 tips to protect your device from Trojans<\/span><\/b><\/h2>\n<p><span data-contrast=\"auto\">There are a lot of good parts of the internet, but there can also be some not-so-good things in the digital world. Reading through all the many ways that your <\/span><span data-contrast=\"auto\">computer system<\/span><span data-contrast=\"auto\"> can be exposed to scary stuff like malvertising (malicious advertising), <\/span><span data-contrast=\"auto\">phishing<\/span><span data-contrast=\"auto\">, and other types of cybercrime can be genuinely frightening.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">However, all is not lost in the battle against Trojan terrors! The following sections outline basic steps you can take to <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/privacy-in-practice-securing-your-data-in-2022-and-beyond\/?hilite=%27digital%27%2C%27security%27\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">enhance your digital security<\/span><\/a><span data-contrast=\"auto\"> and live your online life in peace.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Install an <\/span><\/b><b><span data-contrast=\"none\">antivirus software<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">Even if you\u2019re on guard at all times while browsing online, it helps to have strong antivirus protection in your corner. While you enjoy everything the internet has to offer, <\/span><span data-contrast=\"auto\">antivirus software<\/span><span data-contrast=\"auto\"> can keep an eye out for ever-evolving <\/span><span data-contrast=\"auto\">malware<\/span><span data-contrast=\"auto\"> and other forms of online threats.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">With <\/span><span data-contrast=\"auto\">antivirus software<\/span><span data-contrast=\"auto\"> in <\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus.html\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">McAfee\u00ae Total<\/span><\/a><a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus.html\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\"> Protection<\/span><\/a><span data-contrast=\"auto\">, you get real-time threat protection \u2014 the software program can prevent, detect, and eliminate any <\/span><span data-contrast=\"auto\">malware<\/span><span data-contrast=\"auto\"> or viruses that try to get onto your device. This prevents <\/span><span data-contrast=\"auto\">hackers<\/span><span data-contrast=\"auto\"> and <\/span><span data-contrast=\"auto\">cybercriminals<\/span><span data-contrast=\"auto\"> from taking your personal or banking information for their gain, so you can browse without worry.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">It also comes with an alert if you\u2019re ever about to connect to a risky website, an advanced <\/span><span data-contrast=\"auto\">firewall<\/span><span data-contrast=\"auto\"> for your home security network, and on-demand or scheduled scanning of files and applications. It even works on your <\/span><span data-contrast=\"auto\">smartphone<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Keep your devices updated<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">Those little red prompts or exclamation points that appear on your <\/span><span data-contrast=\"auto\">smartphone<\/span><span data-contrast=\"auto\"> apps and desktop notifications shouldn\u2019t be ignored. Any time your computer or <\/span><span data-contrast=\"auto\">smartphone<\/span><span data-contrast=\"auto\"> lets you know that it\u2019s time for an <\/span><span data-contrast=\"auto\">operating system<\/span><span data-contrast=\"auto\"> update, do it immediately.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Keeping your devices updated means you can take advantage of all the security updates device and app developers are coming up with each day to fight Trojan attacks.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Be careful with <\/span><\/b><b><span data-contrast=\"none\">email attachments<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">Never open anything in an email that you haven\u2019t confirmed came from a verified source. Sometimes, this is easier said than done. However, here are a few clues that an email you\u2019re viewing may not be totally legit:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"Poppins\" data-listid=\"5\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">The text of the email or its header is in a strange font or uses overly sugary language, such as, \u201cHello Dearie, haven\u2019t seen you in a while.\u201d<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u25cf\" data-font=\"Poppins\" data-listid=\"5\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">The tone of the email is particularly urgent, with an \u201copen immediately\u201d vibe, even though no clear emergency has been stated or relayed to you by a trusted source.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u25cf\" data-font=\"Poppins\" data-listid=\"5\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">You receive attachments through <\/span><span data-contrast=\"auto\">instant messaging<\/span><span data-contrast=\"auto\"> or <\/span><span data-contrast=\"auto\">text message<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u25cf\" data-font=\"Poppins\" data-listid=\"5\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">The attachment doesn\u2019t have one of the following designated safe file extensions: GIF, JPG or JPEG, TIF or TIFF, MPG or MPEG, MP3, and WAV.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559740&quot;:276,&quot;335559991&quot;:360}\">\u00a0<\/span><\/li>\n<\/ul>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Implement additional security measures<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">Don\u2019t leave your <\/span><span data-contrast=\"auto\">sensitive data<\/span><span data-contrast=\"auto\"> like a sitting duck. Start by generating the strongest possible passwords for every account you use, and never use the same password for more than one account.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Need a little help? A password manager like <\/span><a href=\"https:\/\/www.truekey.com\/\"><span data-contrast=\"none\">McAfee True Key<\/span><\/a><span data-contrast=\"auto\"> can make your digital life even more secure by saving and protecting your passwords with encryption, suggesting strong passwords for your accounts, and syncing across all of your devices for easy access.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Another smart thing to do is back up everything to an external <\/span><span data-contrast=\"auto\">hard drive<\/span><span data-contrast=\"auto\"> or another safe location. In the event that you\u2019re hacked, you won\u2019t lose all of the important files and information that you had on your <\/span><span data-contrast=\"auto\">infected computer<\/span><span data-contrast=\"auto\"> or device.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"3\"><b><span data-contrast=\"none\">Think twice before clicking on <\/span><\/b><b><span data-contrast=\"none\">pop-ups<\/span><\/b><\/h3>\n<p><span data-contrast=\"auto\">Pop-ups<\/span><span data-contrast=\"auto\"> can be legitimate advertising tools used by businesses that mean no harm. That\u2019s why <\/span><span data-contrast=\"auto\">cybercriminals<\/span><span data-contrast=\"auto\"> use fake ones to harvest your information \u2014 because <\/span><span data-contrast=\"auto\">pop-ups<\/span><span data-contrast=\"auto\"> are such a common sight!\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Don\u2019t ever click on <\/span><span data-contrast=\"auto\">pop-ups<\/span><span data-contrast=\"auto\"> that occur anywhere but inside the actual website of a verified company.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">For example, if you\u2019re on a random website and a <\/span><span data-contrast=\"auto\">pop-up<\/span><span data-contrast=\"auto\"> for a bookstore appears, leave it be. Go to the bookstore\u2019s official website instead to make any purchases.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Malicious <\/span><span data-contrast=\"auto\">pop-ups<\/span><span data-contrast=\"auto\"> can sometimes give themselves away by switching your screen to full-screen automatically. Use this as a tell-tale sign to avoid the ad.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"auto\">Can you remove a Trojan?<\/span><\/b><\/h2>\n<p><span data-contrast=\"auto\">It\u2019s possible to find and <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/understanding-trojan-viruses-and-how-to-get-rid-of-them\/\"><span data-contrast=\"none\">remove some Trojans<\/span><\/a><span data-contrast=\"auto\"> yourself. To start, you\u2019ll want to disable any startup items on your device that don\u2019t come from a trusted source. Just make sure you reboot your device in safe mode so the <\/span><span data-contrast=\"auto\">malware<\/span><span data-contrast=\"auto\"> can\u2019t stop you from removing it.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The important thing here, though, is to make sure you\u2019re not removing any programs that could hurt your system or prevent your device from functioning properly. That\u2019s why an <\/span><span data-contrast=\"auto\">antivirus program<\/span><span data-contrast=\"auto\"> like what\u2019s found in McAfee Total Protection can be a good idea.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b><span data-contrast=\"auto\">Browse confidently with award-winning <\/span><\/b><b><span data-contrast=\"auto\">antivirus software<\/span><\/b><\/h2>\n<p><span data-contrast=\"auto\">Trojans can delete, modify, block, and copy your <\/span><span data-contrast=\"auto\">sensitive data<\/span><span data-contrast=\"auto\"> with relative ease if you leave your <\/span><span data-contrast=\"auto\">Microsoft<\/span> <span data-contrast=\"auto\">Windows<\/span><span data-contrast=\"auto\"> devices unguarded. While <\/span><span data-contrast=\"auto\">Apple<\/span><span data-contrast=\"auto\"> devices have different internal <\/span><span data-contrast=\"auto\">malware<\/span><span data-contrast=\"auto\"> protections in place, they\u2019re not completely immune to Trojans, either.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">No matter what kind of device you\u2019re using, make sure you have the best antivirus protection for your <\/span><span data-contrast=\"auto\">computer system<\/span><span data-contrast=\"auto\"> so <\/span><span data-contrast=\"auto\">cybersecurity<\/span><span data-contrast=\"auto\"> becomes as much a thing of the past as that old <\/span><span data-contrast=\"auto\">wooden horse<\/span><span data-contrast=\"auto\"> in <\/span><span data-contrast=\"auto\">Troy<\/span><span data-contrast=\"auto\">.\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">For <\/span><a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus.html\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">award-winning <\/span><\/a><a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus.html\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">antivirus software<\/span><\/a><span data-contrast=\"auto\"> you can trust, look no further than McAfee. With affordable tiered plans that all provide access to a virtual private network (VPN), McAfee is your one-stop-shop for <\/span><span data-contrast=\"auto\">security software<\/span><span data-contrast=\"auto\"> that makes living life online that much sweeter.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You may vaguely remember reading Virgil\u2019s epic poem \u201cAeneid\u201d back when you were in school. The story of Odysseus and&#8230;<\/p>\n","protected":false},"author":674,"featured_media":156030,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10670],"tags":[],"coauthors":[3973],"class_list":["post-151174","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is a Trojan? | McAfee Blog<\/title>\n<meta name=\"description\" content=\"You may vaguely remember reading Virgil\u2019s epic poem \u201cAeneid\u201d back when you were in school. The story of Odysseus and his cunning plan to hide his Greek\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is a Trojan? | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"You may vaguely remember reading Virgil\u2019s epic poem \u201cAeneid\u201d back when you were in school. The story of Odysseus and his cunning plan to hide his Greek\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-11T22:54:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-17T23:21:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/300x200_Blog_trojan.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"What Is a Trojan?\",\"datePublished\":\"2021-04-11T22:54:55+00:00\",\"dateModified\":\"2022-07-17T23:21:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/\"},\"wordCount\":1991,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/300x200_Blog_trojan.png\",\"articleSection\":[\"How To Guides and Tutorials\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/\",\"name\":\"What Is a Trojan? | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/300x200_Blog_trojan.png\",\"datePublished\":\"2021-04-11T22:54:55+00:00\",\"dateModified\":\"2022-07-17T23:21:16+00:00\",\"description\":\"You may vaguely remember reading Virgil\u2019s epic poem \u201cAeneid\u201d back when you were in school. The story of Odysseus and his cunning plan to hide his Greek\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/300x200_Blog_trojan.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/300x200_Blog_trojan.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To Guides and Tutorials\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What Is a Trojan?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is a Trojan? | McAfee Blog","description":"You may vaguely remember reading Virgil\u2019s epic poem \u201cAeneid\u201d back when you were in school. The story of Odysseus and his cunning plan to hide his Greek","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"What Is a Trojan? | McAfee Blog","og_description":"You may vaguely remember reading Virgil\u2019s epic poem \u201cAeneid\u201d back when you were in school. The story of Odysseus and his cunning plan to hide his Greek","og_url":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2021-04-11T22:54:55+00:00","article_modified_time":"2022-07-17T23:21:16+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/300x200_Blog_trojan.png","type":"image\/png"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"What Is a Trojan?","datePublished":"2021-04-11T22:54:55+00:00","dateModified":"2022-07-17T23:21:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/"},"wordCount":1991,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/300x200_Blog_trojan.png","articleSection":["How To Guides and Tutorials"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/","url":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/","name":"What Is a Trojan? | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/300x200_Blog_trojan.png","datePublished":"2021-04-11T22:54:55+00:00","dateModified":"2022-07-17T23:21:16+00:00","description":"You may vaguely remember reading Virgil\u2019s epic poem \u201cAeneid\u201d back when you were in school. The story of Odysseus and his cunning plan to hide his Greek","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/300x200_Blog_trojan.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/04\/300x200_Blog_trojan.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/what-is-a-trojan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"How To Guides and Tutorials","item":"https:\/\/www.mcafee.com\/blogs\/tips-tricks\/"},{"@type":"ListItem","position":3,"name":"What Is a Trojan?"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/151174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=151174"}],"version-history":[{"count":0,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/151174\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/156030"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=151174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=151174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=151174"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=151174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}