Phishing

(redirected from Phish)
Also found in: Dictionary, Idioms, Encyclopedia, Wikipedia.

Phishing

The illegal practice of attempting to steal an identity by setting up a website and encouraging people to input credit card or other personal information. Phishing often purports to present a legitimate web business and asks the "customer" to give personal information in order to receive fictitious products. Alternatively, phishing may involve a criminal sending out e-mail purporting to be from a bank or credit card company asking for information as part of an "urgent" request. Phishers then steal the identity directly or sell to another party for illegal purposes.
Farlex Financial Dictionary. © 2012 Farlex, Inc. All Rights Reserved

Phishing.

Phishing is one way that identity thieves use the Internet to retrieve your personal information, such as passwords and account numbers.

The thieves' techniques include sending hoax emails claiming to originate from legitimate businesses and establishing phony websites designed to capture your personal information.

For example, you may receive an urgent email claiming to come from your bank and directing you to a website where you're asked to update or verify your account number or password. By responding you give identity thieves an opportunity to steal your confidential information.

Phishing is difficult to detect because the fraudulent emails and websites are often indistinguishable from legitimate ones and the perpetrators change identities regularly.

Dictionary of Financial Terms. Copyright © 2008 Lightbulb Press, Inc. All Rights Reserved.
Mentioned in ?
References in periodicals archive ?
Continue reading "Phish and Loathing in Bonnaroo" at...
Phish and CID Entertainment also are offering limited travel packages, including hotel and tickets, for the Rosemont shows, as well as concert dates in Hampton, Virginia and Las Vegas.
Phish Threat builds greater employee awareness by creating suspicious emails using known techniques, successful spoofs, and contemporary examples.
"The State of the Phish Report shows that simulated phishing attacks are certainly valuable tools in the battle against social engineering attacks, but it also reinforces the need for CSOs, CISOs and their teams to take a broader view of cybersecurity education," Joe Ferrara, President and CEO of Wombat Security said.
To evaluate the performance of the proposed app, a dataset consisting of 200 legitimate websites from Alexa and 200 Phish websites from PhishTank were used.
These more sophisticated attacks care capable of tricking more advanced users who are aware of the telltale signs of an obvious phish attempt but may not immediately sniff out the elements of a targeted attack.
'Inaadmit ko naman po ako talaga pinanggalingan pero hindi ko po s'ya ginamit for illegal purposes (I admit I was the source(of the phished information) but I never used it for illegal purposes),' Salvador told reporters.
Sophos Phish Threat enables IT managers to create authentic phishing simulation and training sessions, and initiates course corrections for their employees.
Teaching Johnny not to fall for phish. ACM Transactions on Internet Technology, 10(2), Article No.
For instance, Wardman & Warner presented an algorithm that compares the sets of known phishing website content files with the file sets of potential phish [20].
In this regard, the authors conclude that free markets allow people to choose between their "real tastes" and "monkey-on-the-shoulder-tastes," and then people are freely available to be phished.