A security attack where the perpetrator installs a Trojan horse on a victim’s computer that’s capable of modifying that user’s Web transactions as they occur in real time. -techtarget.com