| http://www.w3.org/ns/prov#value | - For example, it can inject extra fields over a bank's Web page, asking for information other than a login and password, such as the victim's credit card number and PIN.Those fields appear to be a seamless part of the legitimate Web site but actually are fake, exporting the entered data to the server in the cybercriminal's drop zone.
|