Talk:Trojan horse (computing)
This is the talk page for discussing improvements to the Trojan horse (computing) article. This is not a forum for general discussion of the article's subject. |
Article policies
|
Find sources: Google (books · news · scholar · free images · WP refs) · FENS · JSTOR · TWL |
Archives: Index, 1Auto-archiving period: 90 days |
This level-5 vital article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: |
||||||||||||||||||||||||||||||||
|
Tech Support Scams claiming trojans are on your machine edit
Tech support scams are an industry-wide issue where scammers use scare tactics to trick you into unnecessary technical support services that supposedly fix contrived device, platform, or software problems.
At best the scammers are trying to get you to pay them to "fix" a nonexistent problem with your device or software. At worst they're trying to steal your personal or financial information; and if you allow them to remote into your computer to perform this "fix" they will often install malware, ransomware, or other unwanted programs that can steal your information or damage your data or device.
Scammers may claim they are an affiliate of Microsoft and lead you to this Wikipedia page to pretend to teach you about Trojans.
Computer edit
Trojan horse is called is called to a computer program 39.44.163.77 (talk) 20:37, 28 August 2022 (UTC)
Computer edit
Histroy of Trojan Horse Virus? 111.119.49.123 (talk) 14:22, 14 September 2022 (UTC)
Wiki Education assignment: The Phoenicians - Cunning Seafarers edit
This article is currently the subject of a Wiki Education Foundation-supported course assignment, between 24 January 2024 and 15 May 2024. Further details are available on the course page. Peer reviewers: SusJawn35, Cabbagepatch12345.
— Assignment last updated by MotoMoto1952 (talk) 13:08, 15 April 2024 (UTC)