Phishing

DEFINITION of 'Phishing'

A method of identity theft carried out through the creation of a website that seems to represent a legitimate company. The visitors to the site, thinking they are buying something from a real business, submit their personal information to the site. The criminals then use the personal information for their own purposes, or sell the information to other criminal parties.

BREAKING DOWN 'Phishing'

A classic example of phishing is an identity thief setting up a website that looks like it belongs to a major bank. Then, that thief sends out many emails that claim to be from the major bank and request the email recipients to input their personal banking information (such as their PIN) into the website so the bank may update their records. Once the scammer gets a hold of the needed personal information, they attempt to access the victim's bank account.

RELATED TERMS
  1. Identity Theft

    The crime of obtaining the personal or financial information ...
  2. Man-In-The-Middle Fraud

    A crime where an unauthorized third party obtains a consumer’s ...
  3. Spoofing

    A type of deception where an intruder attempts to gain unauthorized ...
  4. Material Insider Information

    Material information, about certain aspects of a company, that ...
  5. Financial Portal

    A website that provides a variety of financial data and information, ...
  6. Modus Operandi

    A Latin term used in English to describe an individual or group's ...
Related Articles
  1. Personal Finance

    Pros And Cons Of Credit Monitoring Services

    Identity theft is a complex problem. Learn if credit monitoring services are the solution.
  2. Your Clients

    Top Hacks to Protect Clients from Tax Scams

    There are many ways that clients can be victimized in today’s digital world, but there are also many ways to protect against these invasions. Here are some.
  3. Credit & Loans

    Are You A Target For Identity Thieves?

    The Americans at highest risk for identity theft and identity fraud aren't the ones you most expect. See if you're on the high-risk list.
  4. Personal Finance

    The New Ways Thieves Are Stealing Your Identity

    How are thieves now using new technology, like social media and old mobile phones, to steal identities?
  5. Taxes

    How To Safeguard Your Tax Returns From Identity Theft

    Identity thieves love tax season. In 2012, there were 13 million victims of identity theft. As easy as it is for thieves to steal your information, there are also simple measures you can take ...
  6. Your Practice

    How Advisors Can Help Clients Avoid Tax Scams

    Here's how advisors and their clients can avoid falling prey to tax scams and cyber criminals.
  7. Credit & Loans

    Avoid Becoming An Identity Thief's Next Victim

    Use these 7 techniques to keep yourself under the radar and out of the way of identity thieves.
  8. Credit & Loans

    Protect Your Kids Against Identity Theft

    Children have valid Social Security numbers and no debt, which makes them ideal targets. Here’s what parents can do to prevent a scam.
  9. Insurance

    Credit Scams To Watch Out For

    More than 30 million people were victims of fraud in 2007. Will you be next?
  10. Personal Finance

    The Dangers Of Using Personal Finance Apps

    You should think twice before downloading any app that requires your bank account login or other personal information.
RELATED FAQS
  1. What is a "phishing scam" and how can they be avoided?

    The term phishing (as in fishing for confidential information) refers to a scam that fraudulently obtains and uses an individual's ... Read Answer >>
  2. Is getting a free credit report safe?

    Discover whether getting a free credit report is safe, and find out how to get a legitimate free credit report. Understand ... Read Answer >>
  3. What are the top Social Security scams targeted at the elderly?

    Prevent Social Security scams by learning to recognize the most common types of scams that target senior citizens receiving ... Read Answer >>
  4. What metrics are used to gauge the effectiveness of a marketing strategy?

    Understand why companies need sound marketing strategies and how they are able to accurately measure effectiveness of marketing ... Read Answer >>
  5. Do any markets not exhibit asymmetric information?

    Find out why every market possesses information asymmetry, and why this isn't necessarily a huge or insurmountable problem ... Read Answer >>
  6. How significant is asymmetric information risk?

    Learn about the presence of asymmetric information risk in the financial markets and how various parties present or are exposed ... Read Answer >>
Hot Definitions
  1. Demand Curve

    The demand curve is a graphical representation of the relationship between the price of a good or service and the quantity ...
  2. Goldilocks Economy

    An economy that is not so hot that it causes inflation, and not so cold that it causes a recession. This term is used to ...
  3. White Squire

    Very similar to a "white knight", but instead of purchasing a majority interest, the squire purchases a lesser interest in ...
  4. MACD Technical Indicator

    Moving Average Convergence Divergence (or MACD) is a trend-following momentum indicator that shows the relationship between ...
  5. Over-The-Counter - OTC

    Over-The-Counter (or OTC) is a security traded in some context other than on a formal exchange such as the NYSE, TSX, AMEX, ...
  6. Quarter - Q1, Q2, Q3, Q4

    A three-month period on a financial calendar that acts as a basis for the reporting of earnings and the paying of dividends.
Trading Center