Innocent-looking computer program that appears to perform a legitimate and useful function, but also secretly performs destructive and illegal functions such as destroying the stored data or allowing an outsider to gain unauthorized access to the system. Unlike a computer virus, a Trojan horse usually does not replicate itself from one computer to another to spread across a wide area.
Read more: http://www.businessdictionary.com/definition/Trojan-horse.html#ixzz18gxKhzeM