Phishing

(redirected from Phisher)
Also found in: Dictionary, Thesaurus, Medical, Encyclopedia.
Related to Phisher: identity theft, fissure

Phishing

The illegal practice of attempting to steal an identity by setting up a website and encouraging people to input credit card or other personal information. Phishing often purports to present a legitimate web business and asks the "customer" to give personal information in order to receive fictitious products. Alternatively, phishing may involve a criminal sending out e-mail purporting to be from a bank or credit card company asking for information as part of an "urgent" request. Phishers then steal the identity directly or sell to another party for illegal purposes.
Farlex Financial Dictionary. © 2012 Farlex, Inc. All Rights Reserved

Phishing.

Phishing is one way that identity thieves use the Internet to retrieve your personal information, such as passwords and account numbers.

The thieves' techniques include sending hoax emails claiming to originate from legitimate businesses and establishing phony websites designed to capture your personal information.

For example, you may receive an urgent email claiming to come from your bank and directing you to a website where you're asked to update or verify your account number or password. By responding you give identity thieves an opportunity to steal your confidential information.

Phishing is difficult to detect because the fraudulent emails and websites are often indistinguishable from legitimate ones and the perpetrators change identities regularly.

Dictionary of Financial Terms. Copyright © 2008 Lightbulb Press, Inc. All Rights Reserved.
Mentioned in ?
References in periodicals archive ?
While phishers can change the path of a URL in a different way, they must maintain the identity keyword in the URL in order to convince Internet users that they are visiting the correct destination.
might assume that very few Internet users would be susceptible to the phisher.
Phishing is the latest crime of the 21st century: Understanding the techniques and technologies phishers use can help you protect against them.
Microsoft remains phishers' favorite due to its size and the high value of Office 365 credentials, explains Adrien Gendre, chief solutions architect at Vade Secure.
To successfully redirect users to a phishing domain server without users' knowledge, phishers in some cases opt to use a character '@' or its equivalent hexadecimal number '%40' in the URLs [12], [13].
He also says that the phishers like to use government or other large entities (e.g., Bank of America or eBay) as the identities for such schemes because the actual customer base is large and the likelihood is good for finding someone to scam.
Once the victim has entered their data onto the fake web site, the phishers can use it as they please.
In vishing by telephone, phisher deploys VoIP software to call a customer pretending to be an employee of a legitimate company the customer has a business with [21].
Vade Secure, the global leader in predictive email defense, today published the results of its Phishers' Favorites report for Q2 2019.
Children at Captain Webb Primary in Dawley learned about how to avoid hackers, phishers and bullies with an adventure game.
Children learn about avoiding hackers, phishers and bullies.