LIVE NEWSROOM · --:-- · May 24, 2026
A LIBRARY FOR SECURITY RESEARCHERS

GLOSSARY  /  Trojan Horse

What is Trojan Horse?

Malware disguised as legitimate software to trick users into running it.

Named after the Greek myth, a trojan hides malicious functionality inside something that looks useful. Once executed it can install backdoors, steal data, or download more malware.

Unlike worms, trojans do not self-replicate — they rely on the user being deceived.

Related free tools

Related terms

Part of the Ciphers Security glossary. Free reference for analysts, defenders & learners.

Scroll to Top