Software (e.g., Trojan horse) that appears to perform a useful or desirable function, but actually gains unauthorized access to system resources or tricks a user into executing other malicious logic.
« Back to Glossary Index
« Back to Glossary Index
Comments are closed.