Also found in: Dictionary, Financial, Encyclopedia, Wikipedia.


and spoof and card
in. to “fish” for passwords and personal information by trickery, on internet. (Sometimes by setting up a phony URL which people sign in to by giving their passwords or credit card numbers.) They must have been phishing to get my credit card number while I placed an order online.


and carding and phishing 1
n. stealing passwords and personal information on the internet. (see also phish for an explanation.) He set up an evil twin for spoofing at the coffee shop.
See also: spoof

phishing 1

See also: phish
References in periodicals archive ?
We've also learned, from the same article, that the longest Phish song ever performed was at the DCU: A performance of "Runaway Jim'' in 1997.
In fact, a wedding scheduled at one by two visiting Phish fans was moved to the concert grounds at the invitation of the band's management and Great Northeast Productions.
Phish Reporter collects reports of emails sent from PhishMe, noting which users reported them and sending the user acknowledgment of the successful report, thus completing the feedback loop and further enhancing employee capabilities.
With this offering, these organizations are able to have escalation and operational procedures in place in the event of an attack and can invoke MarkMonitor's 24x7 global phish blocking and shutdown services once an attack has been detected.
Until now, phishing attacks have been largely the work of organised criminal gangs, however, the emergence of these 'build your own phish kits mean that any old Tom, Dick or Harry can now mimic bona fide banking websites and convince customers to disclose sensitive information such as passwords, PIN numbers and account details.
MarkMonitor's fraud detection and response services monitor the Internet around the clock to help detect and confirm phish attacks and other online fraud on behalf of financial institutions and other corporations.
Non-Avalanche phishing attacks increased 12 percent year-over-year, filling much of the void left by the disappearance of Avalanche phish.
14 /PRNewswire/ -- RSA Conference 2005 -- WholeSecurity, the leading provider of behavioral, on-demand endpoint security solutions, today introduced the Phish Report Network (http://www.
The other, Phishing Attacks per 10,000, helps indicate which TLDs are predominantly used by phishers who employ subdomain services, or place multiple phish sites on a single domain.