Let's dive into spotting Phishing attempts and commonly used techniques
Man In The Middle, Rogue Access Points & HTTP