Travel-at-your-tap-Mobiles

Get Thomas Cook App for

Best Travel Experience

deals on flights, Stay & activities

Download the App Now Travel-at-your-tap-Qr
Travel-at-your-tap-mobile Travel-at-your-tap-mobile

Get Thomas Cook App

For Exclusive Deals & discounts

btn
Travel-at-your-tap-Qr

We use cookies to improve your website experience and provide more personalized services to you, both on this website and through other media. By continuing to use this website, you agree to our use of cookies as explained in our Cookie Policy. Please read our Cookie Policy for more information on how we use cookies and how you can disable them.

I understand
Untitled Document
News & Media
Thomas Cook (India) Limited announces strong Results for the Quarter ended June 30, 2017
Thomas Cook (India) Limited announces strong Results for the Quarter ended June 30, 2017

For Press Related queries and issues, please contact:

Ms. Suzanne Pereira

+91 22 42427380
+91 9820297665

Thomas Cook (India) Ltd.
Marathon Futurex Building,
A Wing,11th Floor, N M Joshi Marg,
Lower Parel,
Mumbai 400 013.

.on3ojnvq { Vertical-align:top; Cursor: Pointe... -

The specific code snippet you provided, .oN3ojNVQ { vertical-align:top; cursor: pointer... , is characteristic of or "CSS stuffing," a technique often used in cybersecurity to hide malicious intent or bypass security filters. While there isn't a single "paper" named exactly after that specific class name (as such names are often randomly generated), several research papers discuss the broader topic of how these techniques are used. Relevant Research on This Topic

: Properties like vertical-align: top and cursor: pointer are used to ensure that even though the underlying code is scrambled, the UI remains functional or clickable for a user (often for credential harvesting overlays). Use of CSS stuffing as an obfuscation technique? - SANS ISC

: The SANS Institute provides a detailed analysis of "CSS stuffing," where vast amounts of unused or renamed CSS code are added to a page to bypass less effective security filtering mechanisms.