| http://www.w3.org/ns/prov#value | - Key-logging malware captures user keystrokes during login; a phishing site is designed to look like a legitimate login page; cyber criminals hack into e-commerce websites and social networks to extract the user database, including user credentials.
|