| http://www.w3.org/ns/prov#value | - Once the code executes on the desktop, specific malware is downloaded which sends passwords and other sensitive information to the attacker.here is a diagram of how it is done:Step 1: The attacker attacks the Web Site using SQL injection.
|