
Alexa and all related logos are trademarks of, Inc. App Store is a service mark of Apple Inc. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Firefox is a trademark of Mozilla Foundation. or its affiliates in the United States and other countries. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. LifeLock identity theft protection is not available in all countries.Ĭopyright © 2023 NortonLifeLock Inc. Microsoft Defender Antivirus for Windows 10 and Windows 8.1, or Microsoft Security Essentials for previous versions of Windows.įor more general tips, see prevent malware infection.The Norton and LifeLock Brands are part of NortonLifeLock Inc. Use the following free Microsoft software to detect and remove it:

Give a malicious hacker control over the infected device. Send information about the infected device to a malicious hacker including passwords, sign in details for websites, and browsing history. Use the infected device for select fraud. Trojans can come in many different varieties, but generally they do the following tasks:ĭownload and install other malware, such as viruses or worms. It's easy to accidentally download a trojan thinking that it's a legitimate app.

Trojans often use the same file names as real and legitimate apps. This means they either have to be downloaded manually or another malware needs to download and install them. Trojans are a common type of malware, which, unlike viruses, can't spread on their own.
