Let me describe a little further on how this works in vague technicality terms so you understand it. Here, in this explanation, I am hypothetically creating a case where the hacker wants to grab your online credentials (This can be a Credit card, Facebook, Gmail, anything which has an interface for the user to login); in this example, I prefer Facebook as most people are familiar with it.
top of page
bottom of page