Show Summary Details

Quick Reference

A form of hacking in which a Trojan horse program, worm, or other form of malware is introduced to a computer in order to redirect Internet traffic from a legitimate website address to one controlled by the hacker without the knowledge of the computer user. The process is often used to gather information such as passwords and credit card numbers to facilitate online fraud. See also phishing.

Subjects: Law.

Reference entries

Users without a subscription are not able to see the full content. Please, subscribe or login to access all content.