31-12-2021, 04:06 PM
(31-12-2021, 03:59 PM)theold Wrote: Eg. Likely someone access the bank website. They need a few items. The actual person needs to key in the details(ID, name, password, and OTP). They send you a link. Once this actual person keys in the details, that someone now has access to that website. The actual person is no longer needed.This is phishing technique which I understand. But you said something like mirror to counter the phishing. How to mirror?....
![Thinking Thinking](https://sgtalk.net/images/smilies/Animated/thinking_s.gif)
Thinking is difficult, that's why most people judge
Carl Jung