#TrojanVirus

What does a Trojan virus do? A Trojan virus, or Trojan horse, disguises itself as legitimate software to trick users into installing it. Once inside, it can steal data, damage files, take control of your computer, or create a backdoor for further attacks.

Trojans now not only target Windows computers, but also Mac computers and mobile devices. Accordingly, you should never feel too safe or be on the internet without up-to-date anti-malware protection such as Kaspersky Plus Internet Security. Malware often gets onto computers via infected attachments, manipulated text messages or bogus websites. However, there are also secret service Trojans that can be installed on the target systems remotely without the user noticing and without any interaction on the part of the targets.

The Pegasus software from the Israeli manufacturer NSO, for example, is distributed via the mobile phone network. Pegasus includes a powerful arsenal of interception options. The device can be read completely, calls can be recorded, or the phone can be used as a bugging device.

In Germany, too, police authorities use a state Trojan to monitor and track criminals. However, the malware, known in officialese as source TKรœ software, may not be used for surveillance without a court order.