Professional Documents
Culture Documents
Group 2 - Report II
Group 2 - Report II
E-TECH
GROUP
2
members: Sharina tolentino
Charlyn balateria
1 TROJAN HORSE
CONTENTS
2 ROGUE SECURITY
SOFTWARE
WHAT IS TROJAN HORSE?
Keep Your Software Updated: Regularly update your operating system, web browsers,
and other software applications to patch security vulnerabilities. Many Trojan horses
exploit known vulnerabilities in outdated software.
Exercise Caution with Email Attachments and Links: Be cautious when opening email
attachments or clicking on links, especially if they're from unknown or suspicious
sources. Trojan horse malware is often distributed via phishing emails containing
malicious attachments or links.
Use a Firewall: Enable a firewall on your devices to monitor and control incoming and
outgoing network traffic. Firewalls can help block unauthorized access and prevent
Trojan horse malware from communicating with its command-and-control servers.
Be Mindful of Downloads: Only download files and software from reputable sources. Avoid
downloading files from untrustworthy websites or clicking on pop-up ads, as they may contain
Trojan horse malware.
Enable Security Features: Enable security features such as pop-up blockers, phishing filters, and
safe browsing modes in your web browser to protect against malicious websites and drive-by
downloads.
Practice Safe Browsing Habits: Avoid visiting suspicious websites or clicking on suspicious links.
Stick to reputable websites and only enter personal information on secure websites with HTTPS
encryption.
Use Strong Passwords and Enable Two-Factor Authentication (2FA): Use strong, unique passwords
for your accounts and enable two-factor authentication wherever possible. This adds an extra layer
of security to your accounts, making it more difficult for attackers to gain unauthorized access.
Regularly Back Up Your Data: Back up your important files and data regularly to an external hard
drive, cloud storage service, or another secure location. In the event of a malware infection, you
can restore your data from backups without losing valuable information.
Stay Informed and Educated: Stay informed about the latest cybersecurity threats and trends, and
next topic
WHAT IS ROGUE SECURITY
SOFTWARE?
systems.
Fake System Optimizers: These Fake Firewall Programs: These
software.
Fake Browser Security
system.
Fake Security Suites: These
GROU
P-2
members: Sharina tolentino
Charlyn balateria