Watch out for that TROJAN!
CyberSafe Foundation
We are on a mission to ensure inclusive and safe digital access in Africa
Hi there!?
It's your girl Bolatito and I come bearing juicy tips and gist as always.??
Yam harvest season is upon us! ?? If you are a resident of an African community that grows yam, you must have noticed fresh tubers flooding the food market. As a lover of yam, I grabbed myself a large tuber during the week and to my surprise even after thoroughly inspecting the yam, I had somehow purchased an already rotting tuber. As I sat in my kitchen staring at the rotten pieces of yam and the already boiling pot of water in anger, my mind wandered off to how trojan malware attacks occur and I knew I just had to explain the concept to you.?
While you are here, feel free to read my last letter about Spyware if you missed It. Now let’s get back to discussing TROJAN, and all you need to know about this malicious malware. The Trojan horse (popularly known as Trojan) is a type of malicious code or software that appears to be legitimate and harmless but can cause damage, disrupt, steal, or in general inflict some other harmful action on your data or network.??
Just like the ‘harmless’ wooden horse gift that resulted in the defeat of the City of Troy in the ancient Greek myth of the Trojan horse, Trojans can bypass otherwise strong defences protecting a computer system while impersonating a genuine program and eventually take over the system without the user or IT administrator noticing.?
The interesting part of this attack is the attacker deceives you to take the first step of loading and executing the malicious code paraded as a bona fide file or application on your device. The malicious program then executes the task the attacker designed it for, such as gaining backdoor access to corporate systems, spying on users’ online activity, data deletion, data censorship, data modification, data theft, and causing interference in the operation of computers or computer networks. The Trojan malware potentially leaves your computing device susceptible to other “invaders.” A quick indication of your device or system is affected by a Trojan attack is your device setting being changed unexpectedly.?
Some facts about Trojan attacks??
Trojan Malware is categorised based on its functionality, intended use and method of attack. Below are some common types of Trojan malware you need to be cautious of:?
Now that you have a good understanding of this malware type, here are helpful tips to keep prevent trojan attacks.?
领英推荐
?Side Gists?
The second cohort of the DigiGirls training program ended last week graduating 4000+ beneficiaries. This is no small feat as the training required passion and diligence from its beneficiaries and the graduands rose to the challenge, exiting the program equipped with skills and prepared for the next level. Congratulations to the DigiGirls 2.0 cohort, we look forward to receiving news of your career advancement.?
Cybersafe Foundation is set to present the newest members of its cybersecurity talent pool in the first edition of the CyberSafe Hiring Summit happening in October. During the hiring summit organizations and recruiters from across the world will be given the opportunity to interview and hire entry-level cybersecurity professionals from the CyberGirls Fellowship and Enugu Cyber Security Learning (ECSL). Are a recruiter/organisation interested in attending the summit? Fill out the registration form here or send a mail to [email protected] for enquiries.?
It is always fun writing to you, and I look forward to doing it again next week as we discuss computer Worms.??
Till then, watch out for juicy looking rotten yams or should I say Trojan horses????
Yours truly,?
Bolatito?