The term phishing (as in fishing for confidential information) refers to a scam that fraudulently obtains and uses an individual's personal or financial information through the use of the internet or another mobile communication device. Here's the typical way that it works:

  • An individual receives an email which appears to originate from a financial institution, government agency, or a credible institution or company with which you may do business.

  • The message describes an urgent reason that you must "verify" or "re-submit" personal or confidential information by responding in electronic format via a link.

  • The link will take you to a website that appears to look like the reputable organization, but it is actually a website that belongs to the scammer or criminal.

  • Once you are taken to the fraudulent website, you could be asked to provide certain information such as: driver's license number, account numbers, passwords, social security numbers, date of birth and other confidential information.

  • When the individual provides the information, the criminals will then utilize this information to steal your identity by gaining access to personal accounts.

Some of the common "phishing scams" are found in emails that appear to be from someone that you might know, a social networking website, fake websites that accept donations for charities, your instant messaging program and on a cell phone or other mobile device.

Your first level of defense against these scam artists and various other malicious software out there, is to secure your computer by keeping your operating system up-to-date, installing anti-virus software and anti-spyware software. The second level is to be smart and avoid giving any personal information across the internet. If you happen to receive an email that you suspect is a phishing scam, you should contact the real organization immediately and also contact the InternetCrimeComplaintCenter (www.ic3.gov), which is a partnership between the FBI, the NationalWhiteCollarCrimeCenter and the Bureau of Justice Assistance.

Information stolen by hackers can be used to steal your indentity, read Indentity Theft: How To Avoid It to learn ways to safeguard your sensitive information.

The question was answered by Steven Merkel.

  1. What are some high-profile examples of wash trading schemes?

    In 2012, the Royal Bank of Canada (RBC) was accused of a complex wash trading scheme to profit from a Canadian tax provision, ... Read Full Answer >>
  2. How should a whistleblower report unlawful or unethical behavior?

    Whistleblowing takes many forms. A whistleblower could expose government corruption, expose unethical business behavior or ... Read Full Answer >>
  3. How do insurance companies use a whistleblower?

    Fraudulent claims are among the most prevalent and serious business risks that insurance companies face. Many consumers have ... Read Full Answer >>
  4. What are examples of inherent risk?

    Inherent risk is the risk imposed by complex transactions that require significant estimation in assessing the impact on ... Read Full Answer >>
  5. What is the difference between wash trading and insider trading?

    Wash trading is an illegal trading activity that artificially pumps up trading volume in a stock without the stock ever changing ... Read Full Answer >>
  6. What were the primary financial crimes involved in the ZZZZ Best case?

    ZZZZ Best was a company started by Barry Jay Minkow that claimed to be a carpet cleaning business. In fact, it was a Ponzi ... Read Full Answer >>
Related Articles
  1. Professionals

    10 Must Watch Documentaries For Finance Professionals

    Find out about some of the best documentaries that finance professionals can watch to gain a better understanding of their industry.
  2. Investing News

    This is the Fastest-Growing Consumer Complaint

    There’s no way to guarantee that your Social Security number won’t fall into the wrong hands. Here are some ways to make yourself less of a target.
  3. Professionals

    Prevent Employees From Hacking You Computer System

    Cyber security attacks from a current or ex-employee can cause a lot of pain. Here is how to avoid such attacks.
  4. Savings

    Is It Safe to Send Money Through Facebook?

    Learn how Facebook employs strong measures to keep your information safe when sending money, but understand the rare threats that still exist.
  5. Investing

    How Shackling Offshore Banks Will Impact You

    FATCA regulations have cast a wide net on offshore banking activities, and many innocent account holders might get caught in its tangle.
  6. Investing Basics

    Toshiba's Accounting Scandal: How It Happened

    Learn how Toshiba's corporate culture and lax internal controls led to an accounting scandal that ended with the resignation of the company's CEO.
  7. Professionals

    Is Your Financial Advisor Looking Out for You?

    Financial advisors sometimes aren't looking out for clients' best interests. Regulators are scrutinizing their practices; investors should too.
  8. Professionals

    Are You Sure You Aren't Ponzi Scheme-Susceptible?

    Anyone can be a victim of a Ponzi scheme — even the most financially literate. Here's how to avoid the next Madoff.
  9. Professionals

    7 Cybersecurity Tips for Advisors

    The digital age has created a new breed of thief who can break into client files at any time, but there are ways to minimize risk exposure.
  10. Professionals

    Tips for Protecting Clients from Scammers

    Predators now have more access to vulnerable clients than ever before; advisors should communicate with clients to better spot potential scams.
  1. Black Money

    Money earned through any illegal activity controlled by country ...
  2. Credit Card Dump

    The unauthorized copying of all the information contained in ...
  3. PIN Cashing

    A type of fraud in which a stolen credit card or debit card is ...
  4. Carding Forum

    A website dedicated to the sharing of stolen credit card numbers. ...
  5. Synthetic Identity Theft

    A type of fraud in which a criminal combines real (usually stolen) ...
  6. Man-In-The-Middle Fraud

    A crime where an unauthorized third party obtains a consumer’s ...

You May Also Like

Hot Definitions
  1. Capitalization Rate

    The rate of return on a real estate investment property based on the income that the property is expected to generate.
  2. Gross Profit

    A company's total revenue (equivalent to total sales) minus the cost of goods sold. Gross profit is the profit a company ...
  3. Revenue

    The amount of money that a company actually receives during a specific period, including discounts and deductions for returned ...
  4. Normal Profit

    An economic condition occurring when the difference between a firm’s total revenue and total cost is equal to zero.
  5. Operating Cost

    Expenses associated with the maintenance and administration of a business on a day-to-day basis.
  6. Cost Of Funds

    The interest rate paid by financial institutions for the funds that they deploy in their business. The cost of funds is one ...
Trading Center
You are using adblocking software

Want access to all of Investopedia? Add us to your “whitelist”
so you'll never miss a feature!