Security experts call it a
Now the technique is being adopted by a different kind of a hacker

The link for this article located at Wired is no longer available.