answersLogoWhite

0

B: They could be used to capture authentication information of users to gain access to their accounts

User Avatar

Wiki User

15y ago

What else can I help you with?