trojan horse criminal but also websites. By sending multiple requests – from your computer and several other infected computers trojan – the attack can overload the target address which leads to a denial of service trojan.
Typical risks to company’s information might be represented through such threats as spreading viruses and other malicious codes, including spyware, adware, and others, unauthorized access to information, including physical access from inside the company, and confidential information theft. (Zorz, 2009...