Answer:
In this technique the attacker replaces the organization website with a different page. It contains the hackers name, images and may even include messages and background music.
Previous Question | Next Question |
What is Pharming? | Define Mac Flooding? |