<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Mystery Digest &#187; phishing</title>
	<atom:link href="http://www.mysterydigest.com/five-minute-mysteries-cat/phishing/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.mysterydigest.com</link>
	<description>Home of Detective Nose - Two Minute Mysteries</description>
	<lastBuildDate>Sun, 10 Sep 2017 12:33:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.6.1</generator>
		<item>
		<title>Phishing Schemes &#8211; Scams</title>
		<link>http://www.mysterydigest.com/crime-categories/scams/phishing-schemes-scams/</link>
		<comments>http://www.mysterydigest.com/crime-categories/scams/phishing-schemes-scams/#comments</comments>
		<pubDate>Sun, 22 Mar 2009 08:31:57 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Scams]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[scam alert]]></category>

		<guid isPermaLink="false">http://www.mysterydigest.com/?p=67</guid>
		<description><![CDATA[A phishing scam is the fraudulent process of attempting to acquire sensitive information such as usernames, passwords, credit card details and other personal information by masquerading as a reliable entity within an electronic communication. Phishing is typically carried out by e-mail, and/or instant messaging and it often asks users to enter details at a fake [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><img style="float:left; margin:0px 10px 5px 0px;" src="http://www.mysterydigest.com/wp-content/uploads/scamsthumb.jpg" alt="" />A phishing scam is the fraudulent process of attempting to acquire sensitive information such as usernames, passwords, credit card details and other personal information by masquerading as a reliable entity within an electronic communication.</p>
<p>Phishing is typically carried out by e-mail, and/or instant messaging and it often asks users to enter details at a fake website whose look and feel are almost identical to the legitimate one.</p>
<p>Below is a short video guide to recognizing and avoiding many of the common phishing scams found on the Internet.</p>
<p><object width="480" height="295"><param name="movie" value="http://www.youtube.com/v/sqRZGhiHGxg&#038;hl=en&#038;fs=1"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/sqRZGhiHGxg&#038;hl=en&#038;fs=1" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="480" height="295"></embed></object></p>
]]></content:encoded>
			<wfw:commentRss>http://www.mysterydigest.com/crime-categories/scams/phishing-schemes-scams/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
