A program that appears legitimate, but also contains malicious functions which when installed can access personal information, delete files, or possibly allow attackers to gain control of a computer remotely.
Learn how to secure remote access, utilize authenticator apps and mitigate threats like phishing, brute-force attacks & password-stealing malware. Download now!
Want More Content Like This?
Subscribe to get a monthly email featuring blog posts, research, infographics, videos, e‑books, security industry news, all handcrafted by Duo. You may unsubscribe any time.