Hackers constantly look for ways to use trust as a way to access systems. One of the ways that they try is via the same origin policy that used in website traffic. This attack, known as cross site scripting, uses the trust computers have in all information that comes...

read more