« Back to Glossary Index

A highly effective way of breaching security. It involves injecting malicious libraries or components into a product without the developer, manufacturer, or end user realizing it.

« Back to Glossary Index