Trojan Attacks - presented by Leo October 28/2010.

10
Trojan At tacks -pre sented by Leo Oc tober 28/2010

Transcript of Trojan Attacks - presented by Leo October 28/2010.

Page 1: Trojan Attacks - presented by Leo October 28/2010.

Trojan Attacks -presented by Leo October 28/2010

Page 2: Trojan Attacks - presented by Leo October 28/2010.

New Java trojan attacks Mac OS X via social networking sites

Disguised as a video

When being clicked, download and run installer automatically

Page 3: Trojan Attacks - presented by Leo October 28/2010.

What is Trojan? Purpose of creating trojan Distribution of trojan Ways to avoid being infected Conclusion

Page 4: Trojan Attacks - presented by Leo October 28/2010.

What is Trojan?

City in ancient Greece?

Malware that infect system

Page 5: Trojan Attacks - presented by Leo October 28/2010.

Purpose of creating trojan

Get useful information

Remote control

Page 6: Trojan Attacks - presented by Leo October 28/2010.

A devious trojan cause great loss to online bank accounts

-maintained for 3 years

-stole log-ons

Page 7: Trojan Attacks - presented by Leo October 28/2010.

Distribution of trojan Software downloads

Bundling

Email attachments

Browsing malicious websites

Page 8: Trojan Attacks - presented by Leo October 28/2010.

Ways to avoid being infected

Have good browsing habits Don’t download suspicious files Do have an anti-virus software

installed Remedial measure

Page 9: Trojan Attacks - presented by Leo October 28/2010.

Conclusion

Trojan is a malware It’s created to steal data Different ways of its distribution Ways to protect system

Page 10: Trojan Attacks - presented by Leo October 28/2010.

References: Primary: CNN http://arstechnica.com/apple/news/2010/10/ne

w-java-trojan-attacks-mac-os-x-via-social-networking-sites.ars?utm_source=rss&utm_medium=rss&utm_campaign=rss

Wikipedia, http://en.wikipedia.org/wiki/Trojan_horse_(computing) Itbusiness, http://www.itbusiness.ca/it/client/en/home/News.asp?id

=50589 Ehow, http://www.ehow.com/about_5436331_purpose-trojan-virus.

html Privacy, http://www.2privacy.com/www/viruses/trojan-horses.html