Anyways, lets add a drop to our knowledge to keep safe from a hack that can be performed from the system we are working on. Strange! But easily possible. When no one is safe on the internet, how can it be that someone can't fool us on the very host we are working on.
OK, so lets get on to the way. One of the hack recipe we should always be aware and beware of!
Prevention:- Let's know the prevention measure first! Knowing this would be enough to save ourselves from the hack. The question is:- While logging in to our favorite email or any other website, how many of us actually take trouble to read the URL of the web-page? Well, a few of us do but most of us don't! We should make sure that the URL we are going to is a genuine URL and not a 'faked' one. This will prevent us from being a victim. Because the hacker here makes a log-in web-page that looks exactly the same as the email or some other website's log-in page; we log in entering our id and password and when the form is submitted, the secret data actually goes into the hackers intended file and then redirects the us to the original web-page giving an idea that we entered the form incorrectly.
Cure:- Another way is to check. If we notice that we have entered a correct/incorrect id/password and the log-in fails without displaying errors in the wrong field(s), then probably our data is no more secret and we must change the id/password in the very next log-in.
Such coding can be easily done using any of the scripting languages. The main (bad) idea is just to steal the data from input fields and put it elsewhere misguiding the victim.
So we must make sure that we are always alert, while logging in, especially when we go to a browsing center. I came to know about this threat (phishing scam) in an amazing workshop given by Sunny Vaghela, but yesterday only I understood its working, when I created it successfully using PHP.