. . . "Using this technique it is possible that many internet users have had their online profiles, passwords, emails and other online content intercepted and stolen." .