The users then type their account details into the application thinking they were accessing their accounts when they were actually sending their personal details back to the hacker.
Seemingly, this kind of attack is very difficult to detect, and is relatively straightforward to put together.
Downloads and Drivers
From the Forums
Subscribe to TechSpot
Get free exclusive content, learn about new features and breaking tech news.