A program that appears legitimate, but also contains malicious functions which when installed can access personal information, delete files, or possibly allow attackers to gain control of a computer remotely.
With the convenience of remote access, users are at risk of threats like phishing, brute-force attacks and password-stealing malware. Download our Essential Guide to Securing Remote Access to learn how to mitigate these attacks and avoid an expensive data breach.
Fresh Security News. Right to Your Inbox.
Subscribe to get a monthly email featuring blog posts, research, infographics, videos, e‑books, security industry news, all handcrafted by Duo. You may unsubscribe any time.