Most likely Trojan Horses are distributed within innocent programs that claim to provide better access, free time or viewing enhancements for on-line services. Trojan Horse programs are typically distributed via e-mail, and are sometimes embedded in .DOC or .RTF files; when the user double-clicks on these files, the Trojan Horse is executed and inserts itself into the users computer system.
From inside the files, the Trojan Horse is activated and can access passwords, screen names and other personal information and then automatically distribute this confidential data to
Common Trojan Horse warnings:
Save 20% on Trend Micro Titanium Maximum Security! Coupon Code: titanium20