phish

(redirected from Phishing)
Also found in: Dictionary, Thesaurus, Medical, Legal, Financial, Encyclopedia, Wikipedia.

phish

and spoof and card
in. to “fish” for passwords and personal information by trickery, on internet. (Sometimes by setting up a phony URL which people sign in to by giving their passwords or credit card numbers.) They must have been phishing to get my credit card number while I placed an order online.

spoofing

and carding and phishing 1
n. stealing passwords and personal information on the internet. (see also phish for an explanation.) He set up an evil twin for spoofing at the coffee shop.
See also: spoof

phishing 1

verb
See also: phish
References in periodicals archive ?
CYREN Phishing Intelligence, part of the company's Cyber Intelligence Suite, provides an unparalleled view into global phishing attacks from the earliest moments, enabling Cyveillance to deliver crucial extra protection for its customers.
Figure 1 indicates the process of a given phishing attack.
Seven additional steps to steer clear of phishing sites:
Phishing sites aimed at harvesting users' financial details mainly use the brand names of popular online stores, e-payment systems and online banking systems.
In an interview last evening, Green Armor's CEO and respected cybersecurity expert, Joseph Steinberg (CISSP, ISSAP, ISSMP, CSSLP), noted that phishing attacks are increasing because they are producing large profits for criminals stealing both money and valuable information, as many technologies intended to curtail phishing simply fail.
While the cessation of phishing operations by the Avalanche phishing group is great news for the anti-phishing community, their shift to the nearly exclusive distribution of Zeus malware is an ominous development in the e-crime landscape," said study co-author Rod Rasmussen of Internet Identity in Tacoma, Wash.
The security industry is continuously updating itself to fight off the phishing schemes and in Brazil and the UK, three men were arrested and jailed for their phishing schemes this year.
There are several free products that fight phishing by disclosing whether the Web site you contact is legitimate:
Many not only are protecting their internal systems, but also are looking to launch educational campaigns via mail and company Web sites to inform customers, consumers and associates about the potential dangers that lurk in the murky waters of phishing.
Phishing is the distribution of e-mail messages that appear to be from a legitimate source but in fact fraudulently obtain private financial information such as passwords and Personal Information Numbers (PINs).
Phase 1 of the project, estimated to be completed around spring 2005, includes a registry of current and known phishing threats, vulnerabilities, and attack models; a comprehensive inventory of available solution sets; a taxonomy of phishing; and a compendium of proposals to test and evaluate potential solutions.
For example, phishing depends on the mass distribution of e-mail with spoofed addresses.
As phishing continues to net unsuspecting adults who believe that apparently official requests for personal information are not out of order, children are less equipped to recognize the seams and may be enticed to give away names, addresses and telephone numbers.
Comprehensive Email Authentication Proactively Obstructs Phishing Emails;