<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Business Yield Technology</provider_name><provider_url>https://businessyield.com/tech</provider_url><title>PRETEXTING: Definition, Examples &amp; How To Prevent It - Business Yield Technology</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="G5MtxB68De"&gt;&lt;a href="https://businessyield.com/tech/cyber-security/pretexting/"&gt;PRETEXTING: Definition, Examples &amp; How To Prevent It&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://businessyield.com/tech/cyber-security/pretexting/embed/#?secret=G5MtxB68De" width="600" height="338" title="&#x201C;PRETEXTING: Definition, Examples &amp; How To Prevent It&#x201D; &#x2014; Business Yield Technology" data-secret="G5MtxB68De" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
&lt;/script&gt;
</html><thumbnail_url>http://businessyield.com/tech/wp-content/uploads/sites/2/2023/11/How-to-Prevent-Pretexting-Identity-Theft-in-Cybersecurity-and-some-Examples.jpg</thumbnail_url><thumbnail_width>500</thumbnail_width><thumbnail_height>250</thumbnail_height><description>In cybersecurity, catfishing is an example of a pretexting method that scammers use to carry out identity theft. Employers should educate their staff and help them understand the importance of security and the steps they can take to preventing pretexting attacks</description></oembed>
