http://www.w3.org/ns/prov#value | - For example, attacks such as Phishing often make use of confusing host names to dupe customers by directing them to web applications designed to impersonate a legitimate site ??? once the customer hits the fake site their authentication credentials are recorded for later use in financial fraud or identity theft.
|