This could have led to the stealing of identities, allowing a remote attacker to deceive innocent users into downloading malicious code or providing personal and confidential information. |
We analyze major search engines and e-commerce sites for their weaknesses in an attempt to improve security. |