A Trojan is malicious software that disguises itself as a harmless program, but while performing its functions, it secretly causes damage or steals sensitive information. Trojans are usually spread in a stealth fashion, often through email attachments or fake websites. It can perform a variety of malicious activities, such as stealing data, system crashes, or even open backdoors.
Glossary
A user identification method that requires two forms of identification to access resources and data. In addition to the usual username and password pair, some additional information is required to verify that the user is indeed the one trying to access the resource. This could be a fingerprint, a one-time use code sent by email or SMS, a USB or NFC key, etc. It is an additional layer of protection for user accounts, preventing unauthorised access in case of password leakage.
Typosquatting is a technique where attackers register domain names that rely on typos or misspellings in the name of a popular website. For example, if a website is named "example.com", attackers could register the domain names "exmple.com" or "exaple.com". If users mistakenly navigate to these domain names, attackers could use fake websites to collect data or distribute malware.