« Back to Glossary IndexSoftware (e.g., Trojan horse) that appears to perform a useful or desirable function, but actually gains unauthorized access to system resources or tricks a user into executing other malicious logic. Related Articles: Glossary: Antivirus SoftwareGlossary: Behavior MonitoringGlossary: Boot Record InfectorGlossary: Browser IsolationGlossary: Cloud Sandbox