Or an attacker might be able to install a Trojan horse program or unsolicited E-mail sending software, aim at financial enrichment or cause brand name damage by modifying company resources.
或攻击者可以安装一个特洛伊木马程序或不请自来的电子邮件发送软件,目的是在金融活动或造成损害品牌名称,修改公司的资源。
If it succeeds, the attack will download a Trojan with a keylogger component that many anti-virus software packages do not yet identify, according to Websense.
成功的话,攻击者会下载一个键盘记录木马的组成部分,许多反病毒软件还没有确定。
Trojan horse Malware that masquerades as non-malicious software.
特洛伊木马软件,经常伪装成无害软件。
应用推荐