<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Library &amp; Information Technology Services</provider_name><provider_url>https://www.trincoll.edu/lits</provider_url><author_name>Inghilterra, John M.</author_name><author_url>https://www.trincoll.edu/lits/author/jinghilt/</author_url><title>Phish Alert Button (PAB)</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="fkNJk1qbzg"&gt;&lt;a href="https://www.trincoll.edu/lits/technology/tech-support/email/reportspam/report-phishing-emails/"&gt;Phish Alert Button (PAB)&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.trincoll.edu/lits/technology/tech-support/email/reportspam/report-phishing-emails/embed/#?secret=fkNJk1qbzg" width="600" height="338" title="&#x201C;Phish Alert Button (PAB)&#x201D; &#x2014; Library &amp; Information Technology Services" data-secret="fkNJk1qbzg" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><description>Phishing is the most commonly used tool by cybercriminals to steal login credentials, personal information, data, and intellectual property. If you receive an email that seems suspicious (i.e., an email that demands quick action, comes from an unknown sender, asks you to provide login credentials or other personal information, etc.), protect yourself and others in [&hellip;]</description></oembed>
