1- Phishing
2- Social engineering
3- The password is easy
4- Spying on the keyboard
5- By adding in the browser
6- Through malicious applications
7- Through Zero Day gaps
8- Via an application for phones
9 – Browser vulnerabilities
10- via XSS vulnerability
11- Through viruses