Share This

A security attack where the perpetrator installs a Trojan horse on a victim’s computer that’s capable of modifying that user’s Web transactions as they occur in real time. -techtarget.com

« Back to Glossary Index