The ABC of Cybersecurity: T is for Trojan

Posted 66 CommentsPosted in ECBS Blog

Say you used to know a Jane some years ago. If you’ve just received an email from her without having kept in touch for years, consider it suspicious and definitely don’t open the attachment. Jane could be a hacker just waiting to hack into your system through a Trojan.  The Trojan horse was a sly […]