Board Thread:Support Requests - Getting Technical/@comment-32704847-20190528183132/@comment-9605025-20190530004029

reply to #6 Thanks. That article, unfortunately, is not newbie-friendly. However, I am getting the general idea that it is a generic term for a variety malicious activities performed by falsifying the perpetrator's identity to get one or more parties to provide/allow access to data or accept data altered by the perpetrator.