Trojan horses are packages that pretend to be beneficial or cover them selves inside desired or legitimate application to "trick consumers into installing them." When installed, a RAT (remote access trojan) can make a top secret backdoor about the affected product to lead to problems.[21] Be wary of suspicious e-mail: https://cdsc.libraries.wsu.edu/scalar/mblog/learn-about-protecting-your-organizations-computer-and-mobile-activities-with-sentrypc