A user uses a un-trusted public proxy-server to log into his email account, and after sometime finds that he is no more able to log into his email account.
Phishing.
Network eavesdropping.
Man in the middle attack.
Key logger.