{"version":"1.0","provider_name":"Library &amp; Information Technology Services","provider_url":"https:\/\/www.trincoll.edu\/lits","author_name":"Harrell, Amy","author_url":"https:\/\/www.trincoll.edu\/lits\/author\/aharrell\/","title":"Phishing Emails","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"6QUsiR0HNh\"><a href=\"https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/email\/reportspam\/\">Phishing Emails<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/email\/reportspam\/embed\/#?secret=6QUsiR0HNh\" width=\"600\" height=\"338\" title=\"&#8220;Phishing Emails&#8221; &#8212; Library &amp; Information Technology Services\" data-secret=\"6QUsiR0HNh\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Cybercriminals Like to Phish but Don&#8217;t Take the Bait Phishing \u2013 when a cybercriminal poses as a legitimate party in hopes of getting individuals to engage with malicious content or links \u2013 remains one of the most popular tactics among cybercriminals today. Phishing is an attack carried out to steal usernames, passwords, credit card information, [&hellip;]"}