<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Fglynn, Author at TechGainer</title>
	<atom:link href="http://www.techgainer.com/author/fglynnn/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>TechGainer Covers How to Guides, Tweaks, Tips and Hacks on Daily Life use of tech Tools like PC, Windows, Smartphones, Android, iOS, Web Services in Friendlier Way</description>
	<lastBuildDate>Fri, 08 Aug 2014 13:58:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>http://www.techgainer.com/wp-content/uploads/2014/03/cropped-543-ico--32x32.png</url>
	<title>Fglynn, Author at TechGainer</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Spear Phishing: What You Need To Know Right Now</title>
		<link>http://www.techgainer.com/spear-phishing-explained-and-safety-tips/</link>
					<comments>http://www.techgainer.com/spear-phishing-explained-and-safety-tips/#disqus_thread</comments>
		
		<dc:creator><![CDATA[Fglynn]]></dc:creator>
		<pubDate>Sat, 25 Jun 2011 03:40:06 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[antihacker]]></category>
		<category><![CDATA[fake login page]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[keylogger]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[security tips]]></category>
		<category><![CDATA[spear phishing]]></category>
		<guid isPermaLink="false">https://www.techgainer.com/?p=2504</guid>

					<description><![CDATA[<p>Phishing attacks usually involve using email messages, pop ups, and websites that pretend to be from a legitimate bank, business, or well-known websites. People encounter these &#8216;lures&#8217;, and because they think they&#8217;re legitimate, they&#8217;ll share financial and personal information, login details, and contact information. Spear phishing, on the other hand is a little more sophisticated. [&#8230;]</p>
<p>The post <a href="http://www.techgainer.com/spear-phishing-explained-and-safety-tips/" data-wpel-link="internal">Spear Phishing: What You Need To Know Right Now</a> appeared first on <a href="http://www.techgainer.com" data-wpel-link="internal">TechGainer</a>.</p>
]]></description>
		
					<wfw:commentRss>http://www.techgainer.com/spear-phishing-explained-and-safety-tips/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2504</post-id>	</item>
	</channel>
</rss>
