Watch this video on YouTube
Fill in the blank: Trojan malware often disguises itself as __________ to deceive users into executing it.