The original Trojan horse was sent as a gift and when opened,revealed hundreds of armed soldiers who wreaked havoc. Today’sTrojan horses are computer malware that appear to be usefulsoftware, but can result in stolen personal and financialinformation.Many Trojan horses find personal information such as socialsecurity numbers, passwords, PIN numbers and bank accountinformation. Although commonly spread through email attachments, itcan also be downloaded from the internet, received in a P2P filetransfer, or transferred while executing an Internet-based program.It can also be attached to Web Browsers or email programs withsecurity flaws.The term “Trojan horse virus” is a misnomer. It is not a virus.Viruses, by their very definition, replicate themselves and attachto legitimate files and progr