Ok. So, this community has a lot of knowledge with respects problems like this.<p>What are your thoughts regarding how to protect ones self from this type of attack?<p>This is a bleeding edge problem. It goes after 2-factor auth, and it's likely to become more common.