Trojan Horses

A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. It seeks to deceive you into loading and executing the malware on your device. Once installed, a Trojan can perform the action it was designed for. A trojan is often called a "trojan virus", but a trojan is not a virus. A virus can execute and replicate itself autimatically, but a trojan needs a human to execute it. The proper name for a trojan is malware. Heres an example of a trojan: You get an email from somebody claiming they work at the school you go to, and attach some files they say are required for the next semester. The files all look like regular school files, with folders name schedules, and homework, etc. You trust the emailer, and open the files. What you didn't see was a malicous file hidden in the email you accidently ran, and now the trojan can do whatever it wants to. You need to be careful with trojans, because they are hidden behind something that looks innocent.

Trojan Horse Source

Heres the source I used for my information on trojans horses. Click the button below or the image above to go to it.

Social Engineering

Rather than hacking techniques, social engineering is human pschyology instead. Social Engineering has to do with finding out account information, like usernames and passwords, to log into somebody elses account remotely. A common instance of social engineering is somebody calling you, posing as an IT person asking for your account information. The best way to protect yourself against social engineering is to simply be aware of it. If somebody you don't know asks for your information, be cautious of whoever is aksing for it.

Social Engineering Source

Heres the source I used for my information on social engineering. Click the button below or the image above to go to it.