Device Protection
What is a trojan horse attack, and what should I do if I think I’ve opened a trojan?
Part social engineering, part sneaky payload, trojans are popular with attackers because they’re powerful, flexible tools for compromising victims. Here’s what to look for – and simple steps to avoid falling for them.