header bg

Scan QR code or get instant email to install app


Jason is at home, attempting to access his music store's website. When he visits the website, he is greeted with a basic form that requests his name, email address, and phone number. This is not the website of a music retailer. Jason is certain that the website has been hacked. How did the attacker accomplish the hack?

A DNS cache poisoning

Related Information