{"id":1428,"date":"2021-08-24T06:02:19","date_gmt":"2021-08-24T06:02:19","guid":{"rendered":"https:\/\/www.sagaratechnology.com\/blog\/?p=1428"},"modified":"2021-11-16T04:02:04","modified_gmt":"2021-11-16T04:02:04","slug":"know-how-trojans-work","status":"publish","type":"post","link":"https:\/\/sagaratechnology.com\/blog\/know-how-trojans-work\/","title":{"rendered":"Know-How Trojans Work and How to Overcome Them"},"content":{"rendered":"\n<p>Have you ever had your smartphone suddenly stop working? You know, the Trojan has taken control of your phone and stolen your sensitive data. what is it?, how do trojans work?.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69e3a5566a85d\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69e3a5566a85d\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/sagaratechnology.com\/blog\/know-how-trojans-work\/#What_are_Trojans\" >What are Trojans?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/sagaratechnology.com\/blog\/know-how-trojans-work\/#How_Trojans_Work\" >How Trojans Work<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/sagaratechnology.com\/blog\/know-how-trojans-work\/#How_to_Overcome_Trojan_Attacks\" >How to Overcome Trojan Attacks<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"What_are_Trojans\"><\/span>What are Trojans?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Trojan Horse is malware that is good at hiding. The scary thing is, this malware can steal and mess up data and systems on the victim&#8217;s device or website.<\/p>\n\n\n\n<p>I wonder, why is it called a <a href=\"https:\/\/www.sagaratechnology.com\/blog\/\">Trojan Horse<\/a>?, The term Trojan Horse adapts Greek mythology, namely the Trojan War.<\/p>\n\n\n\n<p>It is said that the Greek troops succeeded in winning the victory because they infiltrated a large <a href=\"https:\/\/www.youtube.com\/channel\/UCEgphDbJ89XiszXoPqyJTXg\">wooden horse<\/a> (Trojan horse) which was paraded by the Troy army as a celebratory trophy. When the Troy army was caught off guard, the Greeks attacked.<\/p>\n\n\n\n<h2><span class=\"ez-toc-section\" id=\"How_Trojans_Work\"><\/span>How Trojans Work<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The way the Trojan works is quite simple. because it is simple, many people are trapped by this malware. The reason is, the Trojan is able to disguise itself as software that is difficult for you to distinguish from the original.<\/p>\n\n\n\n<p>Here&#8217;s how the Trojan works:<\/p>\n\n\n\n<ol><li>Hacker sends bait to target. For example: PDF files, specific links, software, etc.;<\/li><li>The target accepts the feed, then clicks on the file they receive;<\/li><li>The Trojan is active, then sends all the info the hacker wants from the device or website;<\/li><li>Hackers will control the system and perform various criminal acts;<\/li><li>Infected devices and servers can transmit this malware to connected devices and websites.<\/li><li>This malware is only active when you invite it into your device. So in conclusion, the Trojan needs the help of the victim to be able to act.<\/li><\/ol>\n\n\n\n<h2><span class=\"ez-toc-section\" id=\"How_to_Overcome_Trojan_Attacks\"><\/span>How to Overcome Trojan Attacks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>After knowing the dangers of trojans, you must be more concerned about trojan, these are some tips for dealing with trojan :<\/p>\n\n\n\n<ol><li>Install the Best Antivirus<\/li><li>Beware of Foreign Emails<\/li><li>Avoid Clicking Suspicious Pop-Ups<\/li><li>Ensure Only Download from Official Site<\/li><li>Use a Safe Internet Network<\/li><li>Use Hosting with Strict Protection<\/li><li>Regularly Update the Operating System and Software<\/li><li>Perform Backups Regularly<\/li><\/ol>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you ever had your smartphone suddenly stop working? You know, the Trojan has taken control of your phone and stolen your sensitive data. what is it?, how do trojans work?. What are Trojans? Trojan Horse is malware that is good at hiding. The scary thing is, this malware can steal and mess up data&#8230;<\/p>\n","protected":false},"author":14,"featured_media":1469,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[109,124,10],"tags":[204,205,206],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Know-How Trojans Work and How to Overcome Them - Sagara Asia Blog<\/title>\n<meta name=\"description\" content=\"Trojans are malware that can disguise themselves as links, files, software, and even emails &#039;as if&#039; came from an official company. how trojans work?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sagaratechnology.com\/blog\/know-how-trojans-work\/\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Know-How Trojans Work and How to Overcome Them - Sagara Asia Blog\" \/>\n<meta name=\"twitter:description\" content=\"Trojans are malware that can disguise themselves as links, files, software, and even emails &#039;as if&#039; came from an official company. how trojans work?\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sagaratechnology.com\/blog\/wp-content\/uploads\/2021\/08\/Hnet.com-image.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sagara Technology\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Know-How Trojans Work and How to Overcome Them - Sagara Asia Blog","description":"Trojans are malware that can disguise themselves as links, files, software, and even emails 'as if' came from an official company. how trojans work?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sagaratechnology.com\/blog\/know-how-trojans-work\/","twitter_card":"summary_large_image","twitter_title":"Know-How Trojans Work and How to Overcome Them - Sagara Asia Blog","twitter_description":"Trojans are malware that can disguise themselves as links, files, software, and even emails 'as if' came from an official company. how trojans work?","twitter_image":"https:\/\/sagaratechnology.com\/blog\/wp-content\/uploads\/2021\/08\/Hnet.com-image.jpg","twitter_misc":{"Written by":"Sagara Technology","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sagaratechnology.com\/blog\/know-how-trojans-work\/#article","isPartOf":{"@id":"https:\/\/sagaratechnology.com\/blog\/know-how-trojans-work\/"},"author":{"name":"Sagara Technology","@id":"https:\/\/sagaratechnology.com\/blog\/#\/schema\/person\/e25a7dce1900980898a69a7c63241723"},"headline":"Know-How Trojans Work and How to Overcome Them","datePublished":"2021-08-24T06:02:19+00:00","dateModified":"2021-11-16T04:02:04+00:00","mainEntityOfPage":{"@id":"https:\/\/sagaratechnology.com\/blog\/know-how-trojans-work\/"},"wordCount":340,"commentCount":0,"publisher":{"@id":"https:\/\/sagaratechnology.com\/blog\/#organization"},"keywords":["trojan","trojan virus","trojan work"],"articleSection":["Fintech","Technology","Tips teknologi"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sagaratechnology.com\/blog\/know-how-trojans-work\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sagaratechnology.com\/blog\/know-how-trojans-work\/","url":"https:\/\/sagaratechnology.com\/blog\/know-how-trojans-work\/","name":"Know-How Trojans Work and How to Overcome Them - Sagara Asia Blog","isPartOf":{"@id":"https:\/\/sagaratechnology.com\/blog\/#website"},"datePublished":"2021-08-24T06:02:19+00:00","dateModified":"2021-11-16T04:02:04+00:00","description":"Trojans are malware that can disguise themselves as links, files, software, and even emails 'as if' came from an official company. how trojans work?","breadcrumb":{"@id":"https:\/\/sagaratechnology.com\/blog\/know-how-trojans-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sagaratechnology.com\/blog\/know-how-trojans-work\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sagaratechnology.com\/blog\/know-how-trojans-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sagaratechnology.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Business + Tech Solution","item":"https:\/\/sagaratechnology.com\/blog\/category\/tech-business\/"},{"@type":"ListItem","position":3,"name":"Fintech","item":"https:\/\/sagaratechnology.com\/blog\/category\/tech-business\/fintech\/"},{"@type":"ListItem","position":4,"name":"Know-How Trojans Work and How to Overcome Them"}]},{"@type":"WebSite","@id":"https:\/\/sagaratechnology.com\/blog\/#website","url":"https:\/\/sagaratechnology.com\/blog\/","name":"Sagara Asia Blog","description":"Dapatkan Informasi Seputar Teknologi dan Bisnis","publisher":{"@id":"https:\/\/sagaratechnology.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sagaratechnology.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sagaratechnology.com\/blog\/#organization","name":"Sagara Technology","url":"https:\/\/sagaratechnology.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sagaratechnology.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/sagaratechnology.com\/blog\/wp-content\/uploads\/2021\/10\/sagara-logo.jpeg","contentUrl":"https:\/\/sagaratechnology.com\/blog\/wp-content\/uploads\/2021\/10\/sagara-logo.jpeg","width":200,"height":200,"caption":"Sagara Technology"},"image":{"@id":"https:\/\/sagaratechnology.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/sagara-asia\/"]},{"@type":"Person","@id":"https:\/\/sagaratechnology.com\/blog\/#\/schema\/person\/e25a7dce1900980898a69a7c63241723","name":"Sagara Technology","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sagaratechnology.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/55085e31e9427bed3336eaea67c72b96?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/55085e31e9427bed3336eaea67c72b96?s=96&d=mm&r=g","caption":"Sagara Technology"},"sameAs":["https:\/\/sagaratechnology.com","https:\/\/www.facebook.com\/Sagaratechnology","https:\/\/www.linkedin.com\/company\/sagara-asia\/"]}]}},"_links":{"self":[{"href":"https:\/\/sagaratechnology.com\/blog\/wp-json\/wp\/v2\/posts\/1428"}],"collection":[{"href":"https:\/\/sagaratechnology.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sagaratechnology.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sagaratechnology.com\/blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/sagaratechnology.com\/blog\/wp-json\/wp\/v2\/comments?post=1428"}],"version-history":[{"count":2,"href":"https:\/\/sagaratechnology.com\/blog\/wp-json\/wp\/v2\/posts\/1428\/revisions"}],"predecessor-version":[{"id":1448,"href":"https:\/\/sagaratechnology.com\/blog\/wp-json\/wp\/v2\/posts\/1428\/revisions\/1448"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sagaratechnology.com\/blog\/wp-json\/wp\/v2\/media\/1469"}],"wp:attachment":[{"href":"https:\/\/sagaratechnology.com\/blog\/wp-json\/wp\/v2\/media?parent=1428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sagaratechnology.com\/blog\/wp-json\/wp\/v2\/categories?post=1428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sagaratechnology.com\/blog\/wp-json\/wp\/v2\/tags?post=1428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}