
The software method refers to Trojan horses being attached to a software download, often found online. However, two general methods of infection have been documented by researchers - by hiding within a piece of software and through phishing.

Trojan horses can infect computers in different ways.

Once downloaded, opened and executed on a computer, the Trojan horse becomes activated. It tricks users into thinking that it is legitimate software and it may very well look that way even to trained eyes. Much like the ancient Trojan horse, modern Trojan horse malware uses the same tactic the Greeks used.

This horse was filled with Greek soldiers and once nightfall came, the soldiers poured out and put Troy to the sword.īut enough with the history lesson. In a successful ploy to breach the impregnable city wall of Troy, the Greeks gave the Trojans a gift of a massive, hollow horse made of wood. In this epic poem, the Greek city-states went to war with Troy in response to the kidnapping of the beautiful Helen. Homer’s “The Iliad” described the Trojan War of the eastern Mediterranean in the 12th century B.C.
