Find the definition of the most commonly used cyber security terms in our glossary below.

What is Trojan in cyber security?

Named after the Trojan Horse from Greek mythology, a Trojan is a type of malicious software that deceives users about its true intent and infiltrates their systems disguised as or embedded within legitimate software. Unlike computer viruses, Trojans don't replicate themselves, but they can be just as destructive. Once activated, Trojans can cause persistent damage by deleting data, blocking data, modifying data, copying data, or interrupting the performance of computers or computer networks. They pave the way for cybercriminals to gain unauthorized access to infected systems to steal sensitive data or deploy other destructive programs. Trojans come in various forms, with some of the most common being backdoor, exploit, rootkit, and Trojan-Banker.