What is a Trojan Horse?
A program that appears to be non-threatening, but in fact has underlying malicious intent - a computer virus. This type of program is named after the famous Trojan Horse used by the Greek army to deceptively defeat Troy in Virgil's Aeneid.
Malicious software disguises itself as a program that either naturally belongs or seems harmless. Many trojan horse programs open backdoors that cyber criminals can use to gain wider access to the target system - just like in the story.
In Virgil's story, the Greeks build a large wooden horse and claim that it is an offering to the Gods in return for s safe sea journey home. The Trojans brought the horse into the city without - not realizing that inside the wooden horse were hidden Greek soldiers. At night, the Greek soldiers emerged from hiding and opened the gates of Troy to the greater Greek army laying in wait - leading to the destruction of the city.
Touchless, contactless, passwordless 2FA with continuous authentication. One key for all your passwords. Experience fully automated login and security. Instant 2FA, auto-OTP, password manager and worry-free workflow with proximity-based privileged access management for Windows 10, 8, 7, macOS, desktop applications, and websites.