
Figure 5.31 …Phishing Exposed Is Added to the Victim’s Wish List
If we were an “evil” spammer, anytime a user went to our Web site, it would
attempt to add the book to the Checkout Cart. If we decided to implement a
more complicated attack, we could lure Amazon users to successfully purchase
the book without their knowledge, especially if we can lure the user to log in—
then we can turn on the “one-click” ...