Phishing – What Is It?

what is phishing?

Phishing is an illegitimate method of extracting the personal and other financial details of a person.

Basically, it is a process of tricking a person on the internet to retrieve their banking passwords, bank accounts, phone number, credit card details, etc.

This practice has grown over exponentially over last few years.

The imposters send you emails that can lure you into entering your personal details somehow into the mails sent by them and once they get what they want, they will raise a toast and have a bash on your hard-earned money.

The laws and police have become very vigilant and tough to nail these kinds of fraudsters.

what is phishing?

what is phishing?

Fraudulent E-Mails

The preferred mode of Phishing is via sending fraudulent emails.

Note, though, that reputed organizations like Amazon, eBay and banks never ask anyone for their password in their emails.

Next, whenever you open a phishing email, then the link in that mail will always open a site that has no security encryption.

For instance, the valid url of the site will not have HTTPS at the beginning and many email links have some other extension like .rs at the end of the email.

Moreover, the format of the email is very generic whereas the reputed organization always refers to you with your customer id number in their emails.

The most effective manner to remain protected from phishing scams is that you have enough knowledge to recognize one instantly.

However, installing pop up blockers and spam filters in your browser is yet another step you can follow.

About Lee Munson

Lee's non-technical background allows him to write about internet security in a clear way that is understandable to both IT professionals and people just like you who need simple answers to your security questions.


  1. […] doesn’t matter what device that you are on, if you get caught by a phishing attack, then you are still in […]

  2. […] types of attacks when it comes to chain mails online, most of the time you will just see a simple phishing attack. There is less of a need to set up a highly technical attack when you are dealing with people are […]

  3. […] over. Or you will find links that will ask you to go to a certain web site only to be victim of a phishing attack. This means that you give over your information to a fake web site and then it is used in an […]

  4. How Can I Protect Myself And Avoid Becoming A Victim Of Identity Theft? says:

    […] done in full view, you are better paying in cash.It can also be done through what is best known as phishing; this usually occurs when a criminal approaches you by e-mail posing as a company you do business […]

  5. […] in full view, you are better off paying in cash.It can also be done through what is best known as phishing; this usually occurs when a criminal approaches you by e-mail posing as a company you do business […]

  6. […] on how to tell if a domain is real or not this can mean real trouble. This is one of the ways that phishing attacks are so successful. People see the name of the web site but they do not look at the endings. They do […]

  7. […] that you would see on any web site that allow links. The typical stuff includes actions like phishing and misdirection which are all pretty commonly found on web sites such as this. But most of the […]

  8. […] amazing deals unless you are sure they come from a reputable company. Many spam emails lead to online scams that will cost you money, not save you […]

  9. […] I start, I should describe what a phishing attack is for people who do not know […]

Speak Your Mind