a phishing attack uses email whenever working over a wireless network
a phishing attack uses email while using social networking site
a phishing attack uses email to trick people into providing sensitive information
a phishing attack uses email could expose a computer to sniffing attachs
a phishing attack uses email cost companies an individuals a hage sum of money