And at night the horse’s belly opened, but it was too late… After a long siege, the Greeks finally managed to capture the city of Troy and put an end to the Trojan War. Thousands of years later, the Trojan Horse myth is still alive, albeit in an unflattering interpretation. The sophisticated cunning and miracle of engineering thought of the Greeks gave the name to a group of malicious digital tools, the sole purpose of which is to cause damage to the victim’s computers unnoticed. They do this by reading passwords, recording keystrokes, or downloading other malware that can even take over the entire computer. They can perform the following actions:
Deleting data
Blocking data
Changing data
Copying data
Disruption of computers and computer networks
Unlike computer viruses and worms, Trojan programs are not capable of self-replication.