Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

The last dialog looks crazily realistic. Is it possible to distinguish it from a real OS dialog without trying to move it? It looks awfully practical for phishing.


When I saw the last dialog box, my first thought was, is this toolbox's primary use for phishing?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: