Authored by a Symantec employee

 

What is a Trojan Horse? Borrowed from the story of the wooden horse used to trick the defenders of Troy into sneaking soldiers into their city, a Trojan Horse hides malware in what appears to be a normal file. There are a wide variety of Trojan viruses on the Internet landscape that can perform an array of tasks. Most Trojans are typically aimed at taking control of a user’s computer, stealing data and inserting more malware on to a victim’s computer.

A security suite that helps protect your devices.

Free security software just doesn’t have the resources to keep up with new threats as they emerge. That’s why you need a multi-layered defense to security. Meet Norton Security Premium - protection for up to 10 of your devices.
In just a few clicks, you can take a trial of Norton Security Premium – free for 30 days.

No Credit Card Required

These are some of the most common:

  • Backdoor Trojan - These Trojans can create a “backdoor” on a users’ computer, allowing the attacker access to the machine in order to control it, upload stolen data and even download more malware onto the computer.
  • Downloader Trojan - The main purpose of these Trojans are to download additional content onto the infected computer, such as additional pieces of malware.
  • Infostealer Trojan - This Trojan’s main objective is to steal data from the infected computer.
  • Remote Access Trojan - This Trojan is designed to give the attacker full control over the computer.
  • Distributed Denial of Service (DDoS) Attack Trojan - This Trojan performs DDoS attacks, which are designed to take down a network by flooding it with traffic.

Trojanized apps

Trojans aren’t just problems for laptop and desktop machines. They can also impact your mobile devices as well. Generally speaking, a Trojan comes attached to what looks like a legitimate program, however, it is actually a fake version of the app, loaded up with malware. These cybercriminals will usually place them on unofficial and pirate app markets for unsuspecting users to download. In addition to the threats mentioned above, these apps can also steal information from your device, and generate revenue by sending premium SMS texts.

How to Stay Protected:

  • Computer security must begin with an Internet security suite. Run periodic diagnostic scans with your software. You can set it up so the program runs scans automatically during regular intervals.
  • Update your operating system’s software as soon as the updates are available from the software company. These groups tend to exploit security holes in outdated software programs. In addition to operating system updates, you should also check for updates on other software that you use on your computer as well.
  • Don’t visit unsafe websites. Most Internet security suites include a component alerting you that the site you’re about to visit is unsafe.
  • Don’t download attachments or click on links in unfamiliar emails.
  • Protect accounts with complex, unique passwords.
  • Finally, you should always keep your personal information safe with firewalls.

Our best protection. One low price. 

Norton Security Premium helps protect up to 10 of your Windows PCs, Macs, Android smartphones or your iPads.
With our no-risk offer, you can try before you buy – free for 30 days.

No Credit Card Required


Symantec Corporation, the world’s leading cyber security company, allows organizations, governments, and people to secure their most important data wherever it lives. More than 50 million people and families rely on Symantec’s Norton and LifeLock comprehensive digital safety platform to help protect their personal information, devices, home networks, and identities.

© 2017 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Norton, Norton by Symantec, LifeLock, and the Lockman Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Google Chrome is a trademark of Google, Inc. Mac, iPhone and iPad are trademarks of Apple Inc. Microsoft and the Windows logo are trademarks of Microsoft Corporation in the United States and/or other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.