What is 'Phishing'

Phishing is a method of identity theft carried out through the creation of a fraudulent website, email or text appearing to represent a legitimate firm. A scammer may use a fraudulent website that appears on the surface to look the same as the legitimate website. Visitors to the site, thinking they are interacting with a real business, may submit their personal information, such as social security numbers, account numbers, login IDs and passwords, to this site. The scammers then use the information submitted to steal the visitors money, identity or both, or sell the information to other criminal parties.

Phishing may also occur in the form of emails or texts from scammers that are made to appear as if they are sent from a legitimate business. These fake emails or texts may install programs like ransomware that can allow scammers to access a victim's computer or network.

BREAKING DOWN 'Phishing'

Phishing scammers create a false sense of security for their targets by spoofing or replicating the familiar, trusted logos of well-known, legitimate companies, or they pretend to be a friend or family member of their victims. Often, the scammers attempt to persuade victims they need personal information urgently, or the victim will experience a severe consequence, such as frozen accounts or personal injury.

A classic example of phishing is an identity thief setting up a website that looks like it belongs to a major bank. Then, that thief sends out many emails that claim to be from the major bank and request the email recipients to input their personal banking information (such as their PIN) into the website so the bank may update their records. Once the scammer gets a hold of the needed personal information, they attempt to access the victim's bank account.

Protecting Yourself from Phishing Attacks

The following highlights signs of phishing, and how to protect yourself.

  1. Exceptionally good deals or offers. If an email touts offers that are too good to be true, they probably are. For example, an email claiming you've won the lottery or some other lavish prize may be luring you in to get you to click a link or relay sensitive personal information.
  2. Unknown or unusual senders. Though phishing emails may look like they originate from someone you know, if anything seems out of the ordinary, be cautious. When in doubt, hover over the email address of the sender to ensure the email address matches the email address you expect. Place a phone call to the company if you are unsure of an email or website. Don't respond to emails with any personal information.
  3. Hyperlinks and attachments. These are particularly concerning if received from an unknown sender. Never open links or attachments unless you are confident they are from a safe sender. Type in the link address rather than clicking the link.
  4. Incorrect spelling in the web address. Phishing sites often use web addresses that look similar to the correct site, but contain a simple misspelling, like replacing a "1" for an "l".
  5. Immediate pop-ups. Be wary of websites that immediately display pop-up windows, especially those asking for your username and password. Use two-factor authentication, a browser with anti-phishing detection and keep security on your systems up-to-date.
RELATED TERMS
  1. Social Engineering

    Social engineering is the act of exploiting human weaknesses ...
  2. Email Money Transfer (EMT)

    An email money transfer (EMT) is a retail banking service that ...
  3. Smishing

    The use of SMS (short messaging services) technology to phish ...
  4. Identity Theft

    Identity theft is the crime of obtaining the personal or financial ...
  5. Reloaded

    Reloaded is a slang term meaning that a consumer who was previously ...
  6. Synthetic Identity Theft

    Synthetic identity theft is a type of fraud in which a criminal ...
Related Articles
  1. Tech

    Cybersecurity: Protect Yourself This Tax Season

    Take a little extra time to review online communications and avoid becoming a cybercrime victim.
  2. Tech

    Cybersecurity: Stay Safe Online With These Tips

    No one can guarantee that any of us are 100% safe from cyber and identity related crimes, but we can make ourselves less of a target. Here's how.
  3. Tech

    How to Keep Accounts Safe From Cyber Criminals

    With the advancement of financial technology online comes the risk of criminals who try to hack your accounts. Here's how to protect yourself.
  4. Insights

    Watch Out For These Top Internet Scams

    The Internet had make it easier than ever for scammers to trick people into giving away their money and personal information. These are the scams to avoid.
  5. Tech

    11 Ways to Help Prevent Identity Theft

    Identity theft is no joke. Here are 11 ways to help prevent falling victim to it.
  6. Tech

    Protecting Private Information From Hackers

    Two examples of how security measures protected clients' money from email hackers.
  7. Financial Advisor

    Why Email Marketing Should Be an Advisor Priority

    You have only so much time in your day. Email marketing makes it easier for advisors to maintain that ever-so-important one-on-one relationship.
  8. Investing

    What Is Phishing?

    Find out more about this scam and how to avoid it.
  9. Insights

    Don’t Fall for These Tax Scams

    Here are some common tax scams to avoid and how to report scammers.
  10. Financial Advisor

    Here Are the Keys to Clients Opening Your Emails

    Email marketing is a huge part of most financial advisors' digital marketing strategy. Here’s how to write email that clients actually want to open.
RELATED FAQS
  1. What are the top Social Security scams targeted at the elderly?

    Prevent Social Security scams by learning to recognize the most common types of scams that target senior citizens receiving ... Read Answer >>
  2. Where can I find a company's annual report and its SEC filings?

    Thanks to the Internet, finding financial reports is easier than ever. Nowadays, every reputable company has an investor ... Read Answer >>
Hot Definitions
  1. Yield Curve

    A yield curve is a line that plots the interest rates, at a set point in time, of bonds having equal credit quality, but ...
  2. Portfolio

    A portfolio is a grouping of financial assets such as stocks, bonds and cash equivalents, also their mutual, exchange-traded ...
  3. Gross Profit

    Gross profit is the profit a company makes after deducting the costs of making and selling its products, or the costs of ...
  4. Diversification

    Diversification is the strategy of investing in a variety of securities in order to lower the risk involved with putting ...
  5. Intrinsic Value

    Intrinsic value is the perceived or calculated value of a company, including tangible and intangible factors, and may differ ...
  6. Current Assets

    Current assets is a balance sheet item that represents the value of all assets that can reasonably expected to be converted ...
Trading Center