answersLogoWhite

0

yes there are password stealing trojans PSW.

User Avatar

Wiki User

17y ago

What else can I help you with?

Related Questions

What can cause a trojan horse virus on a computer?

Access to your saved passwords, access to your file, see you, hear you, can break your PC, remotly control your PC


What is the name of the virus that appears to be legitimate program but when opened it can steal passwords or data?

Trojan


What was the name of the virus that appears to be a legitimate program but when opened it can steal passwords or destroy data?

Trojan horse


What is a mIRC virus Trojan?

mIRC is an Internet Relay Chat (IRC) client for Microsoft Windows.So the Trojan which affects this piece of software and steals passwords


What does a Trojan horse virus do to the computer?

It can # make the computer slow # cause popup # steal passwords # cause errors


What damage can a virus do?

they can access certen programs and can see ur passwords


What is the name of the virus that appears to be a legitimate program but when opened it can steal passwords or destroy data?

The name it's given is called a Trojan virus taken from the Trojan war with worriors inside a giant wooden horse that was a given as a gift.


How do you make a Trojan virus through java?

'you need a Trojan horse to create a Trojan virus' LOL , Trojan Horse itself is a Virus !


What are the types of Trojan horse virus?

There aren't types of Trojan Horse virus. A Trojan Horse is a type of virus.


Is Trojan a virus?

Trojan is a kind of Malware. And Malwares are virus.


Why can't i access the options on my control panel?

This may be because you have a virus and the virus/trojan has restricted you from accessing this to solve the virus. Effectively, the virus will stop you from getting rid of the virus if that makes sense.


What is the name of the virus that steals passwords or destroy data?

Viruses can have many different names or 'types' and can do many different things. A 'Stealer' will steal your saved browser passwords, a 'Trojan' will give a hacker access to all of your personal files and a 'Worm' will embed itself into your system to connect to a network of hacked computers (Usually to perform DDoS attacks).