. . . "Most of the cyber thieves use this method especially for stealing information about the user???s credit cards and bank accounts but it can also be used for stealing identities (identity theft), email or other company???s account passwords." .