Watch this video on YouTube
What attack method involves slicing a small amount of money from a computerized transaction and transferring it to unauthorized accounts?