Learn More

General information

What is a Trojan horse?

A Trojan horse is a Malware that infiltrates your system by impersonating to be a harmless or useful software or service. It might be a picture you received in the eMail, an internet site you visited many times or even a phone call.

Once inside your system, the Malware might further infect other computers in the organization (becoming a Worm), destroy data, spy on you and steal your documents, or give the attacker control over your workstation.

What is a Spyware?

A Spyware is any Malware that is intended to steal resources such as documents or data - not just destroy your computer. It can send your confidential information to the competitor, steal the password to the bank account, etc.

A spyware can also completely take over your computer, thus allowing it's sender to act in your name, without your knowledge. Among other things, He can use your identity to infect other victims, such as your superiors, customers, partners etc.

What is a Rootkit?

Following infection, the malware will try to hide itself. One method is to replace part of your operating system (i.e. windows) with fake parts. This way, when you or your protective softwares look for the malware it will not be found. Those fake parts are called Rootkit.

Why do you need Trojan detection

I thought all this Trojan thing was just a Hype?

Actually, Spyware and Trojan attacks are on the increase. Others around you have been attacked recently, and found out their protections where not sufficient.

But I have an Antivirus and a Firewall

An Anti-Virus is not enough. Firewall cannot protect you against Trojan attacks, as they are usually brought in by a naive employee. Moreover, sometimes the break in is done by social engineering, in which case your protections are irrelevant. Also, the Firewall is impaired when trying to tell apart a legitimate user activity from a spyware leaking out your confidential information.

My Firm has internal network, and I only surf to known and SSL protected sites.

If you can send and receive email from people outside your organization - you are vulnerable.  If you have access to the internet - you are vulnerable. Even on SSL sites you are vulnerable.

  • Email - Any attachment you receive might be a Trojan, even an Office document or a simple picture. And you don't need to actively execute anything, sometimes viewing it in Outlooks preview pane is enough.

  • Internet - you can get infected by viewing a site [1, 2, 3] , even without downloading anything. This is true even for known and trusted sites, as this sites can be hijacked [1, 2, 3] . Your connection to the internet can be used to leak out data, after you have been infected.

  • SSL - the encryption itself is powerful indeed, unfortunately the hackers don't need to break it. they record your key strokes as you type in your password, and then they can impersonate you on this secure site.

What would anyone spy on me for ?

Price proposal, new products, employees salaries, bank passwords and of course - infecting your customer through you.

Why use detectIT

I can buy a shrink-wrapped security product

As well you should - we will probably recommend some of them ourselves. However, those products rely on signatures of known Malwares, so if you are the target of a personalized attack they won't detect it. Worse yet, some intruders use rootkits to divert just such products. We reveal Uncommon or tailor-made infections.

I can have my IT people scan my computers

Your IT people, talented as they may be, do not specialize in local network security. There are many inexplicable details in a running operating system that might be a malware - it takes expertise and experience to recognize the real ones. We specialize in recognizing trojan and spyware signatures.

My IT person also a security expert.

As in any other field, it is hard to see your own mistakes. That is because the human mind is biased towards its own decisions. Not to mention having to admit your own errors. You should also consider the fact that your IT person is overloaded as it is with innumerable other tasks, and can't dedicate himself to a massive scan of all workstations. We are unbiased and dedicated.



Learn more

General information
What is a Trojan horse, and what does it do to you

Why do You need trojan detection
It's not a hype, Antivirus and Firewall wont help, and You are not safe even on your own network surfing only to known sites. And yes, you do have something worth stealing.

Why use detectIT?
...and not off-the-shelf product, or freewares.

        © Copyright 2006. detectIT.co.il | underdog projects