PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • Like regular phishing, spearphishing uses emails to get the recipient to divulge sensitive information, such as passwords, or click on an attachment or bogus URL. Clicking typically triggers the downloading of Trojans or other malware that opens back doors used by the perpetrators to move further through the target network and steal lots of sensitive data.
http://www.w3.org/ns/prov#wasQuotedFrom
  • mcafee.com