The A List Apart Blog Presents:

Hacking the A Tag in 100 Characters

Article Continues Below

In most browsers it’s possible to hijack a link after a user has clicked it, making phishing attempts much harder to detect.

No Comments

Got something to say?

We have turned off comments, but you can see what folks had to say before we did so.

More from ALA

A Content Model Is Not a Design System

Why do so many content models still look more like design systems rather than reflecting structured data? Mike Wills takes us on a personal journey as he examines his own past experiences and invites us to conceive content models that articulate meaning and group related content together for use on any channel.