A security attack where the perpetrator installs a Trojan horse on a victim’s computer that’s capable of modifying that user’s Web transactions as they occur in real time. -techtarget.com
« Back to Glossary IndexA security attack where the perpetrator installs a Trojan horse on a victim’s computer that’s capable of modifying that user’s Web transactions as they occur in real time. -techtarget.com
« Back to Glossary Index