The majority of Trojan horse infections occur because the user was tricked into running an infected program. This is why you are not supposed to open unexpected attachments on emails -- the program is often a cute animation or a sexy picture, but behind the scenes, it infects the computer with a Trojan or worm. The infected program does not have to arrive via email, though; it can be sent to you in an Instant Message, downloaded from a Web site or by FTP, or even delivered on a CD or floppy disk. (Physical delivery is uncommon, but if you were the specific target of an attack, it would be a reliable way to infect your computer.) Furthermore, an infected program could come from someone who sits down at your computer and loads it manually.
last modified: 2009-04-27 18:01:07