Watch this video on YouTube
Which of the following types of malware is MOST likely to be used in a phishing attack to grant an attacker access to a target computer?