Content protected from screenshots
Question

What is a Trojan horse in the context of cybersecurity?