0
When you hear the term “Trojan Horse”, you’ll likely think of the ancient Greek myth, in which the city of Troy is invaded via an elusive trick using a large statue of a wooden horse. But this term also has relevance in the cybersecurity realm. So, what is a Trojan Horse in this sense, and how does it work?