Abstract: Recently, hackers have made plans to replicate harmful links by tricking people in a variety of ways. By acquiring access to sensitive information they use online, they attempt to remotely ...