Trojan horse

(redirected from Trojan horses)
Also found in: Dictionary, Thesaurus, Financial, Idioms.
Related to Trojan horses: Spyware, logic bomb

Trojan Horse

1. Greek myth the huge wooden hollow figure of a horse left outside Troy by the Greeks when they feigned retreat and dragged inside by the Trojans. The men concealed inside it opened the city to the final Greek assault
2. Computing a bug inserted into a program or system designed to be activated after a certain time or a certain number of operations

Trojan horse

[‚trō·jən ′hȯrs]
(computer science)
A computer program that has an unannounced function in addition to a desirable apparent function.

Trojan Horse

hollow horse concealed soldiers, enabling them to enter and capture Troy. [Gk. Myth.: Iliad]
See: Deceit

Trojan horse

(application, security)
(Coined by MIT-hacker-turned-NSA-spook Dan Edwards) A malicious, security-breaking program that is disguised as something benign, such as a directory lister, archiver, game, or (in one notorious 1990 case on the Mac) a program to find and destroy viruses! A Trojan horse is similar to a back door.

See also RFC 1135, worm, phage, mockingbird.
References in periodicals archive ?
Turnbull "Some people are lucky and have a Trojan horse on their computer which hasn't been accessed by criminals, but others are not so lucky and have bank details stolen, software and data corrupted, and key strokes logged for passwords.
In addition, Apple's anti-malware function incorrectly identifies the variants it finds, since, in all eases, the alert displayed for any RSPlug Trojan horse variant states that the RSPlug.
In addition, China's Trojan Horses exposes the serious national security problem caused by Congress and the State Department in their inexcusably promiscuous granting of visas of all kinds--F-1, H-1 B, J, J-1, and L--to hundreds of thousands of Chinese students, scientists, and hightech workers.
For information on these and other Trojan Horses, I recommend the Carnegie-Mellon University Computer Emergency Response Team (CERT) web site, which has information, advisories, and directions to access counter-measures.
When these technologies combine to work together as part of an integrated solution, the enterprise enjoys complete protection against both simpler and more sophisticated threats, including viruses, worms, Trojan horses, blended threats and hackers.
Sophos have warned users about a Trojan horse that poses as a wallchart for the World Cup tournament.
1 carried Trojan horses, according to the audit of companies.
Users who click on the link contained in the email may be infected by a series of Trojan horses that aim to steal confidential information from infected PCs.
Banks targeted by the Trojan horses included Banco do Brasil, Bradesco, Caixa Economica Federal, HSBC, Itau, and Unibanco.