Viruses and Trojans |
A Trojan is unwanted software which runs on a user's machine, as an agent of the attacker and without the user being aware.
An exploit is a program (exploit code) used to exploit a weakness (vulnerability) discovered in an operating system or program.
The weakness is exploited by a hacker to gain access and take control of your computer. The exploit typically occurs via a backdoor or Trojan to allow a hacker future access your computer without the need to attack it again, even after the original vulnerability has been fixed (i.e. patched).
Examples of Trojans
Remote Access Trojans (RATs) allow a hacker to control your computer remotely. These are becoming more commonplace through the use of peer-to-peer file sharing programs. For example, sharing music files.
Distributed Denial of Service (DDOS) Zombie allow a hacker to use your computer run a DDOS (Distributed Denial of Service) attack on other computers or collection of computer systems. Attackers frequently attack the web sites of major companies by installing thousands of Zombies on unsuspecting user's computers.
Key Loggers monitor your keystrokes and allow a hacker to 'steal' data from your computer, such as your passwords, credit card and bank details.
Prevx Home prevents these types of programs being installed on your computer, even if the original vulnerability weakness has not been fixed by blocking the hole in the program.