Phishing is the process of getting sensitive and confidential information such as username, passwords, pin codes and contact details by illegal means.
Phishing is similar to spam in operation and appearance but more like a spyware in functionality.
In phishing an architect of the process sends you emails that look absolutely legitimate and from a well known and well reputed website.
These phishing emails often contain a link embedded inside. When you click that link it takes you to another website.
That website also resembles the actual and legitimate website but in reality this website like the email and link is also fake and is serving the purpose of architect of that phishing attack.
The website asks you some typical tasks, such as verify your id, or buy something using your credit card, provide contact details or give your account number.
If you become victim of phishing email and enter any of the above mentioned confidential information, that information is passed to the perpetrator of the phishing attack.
Phishing attacks involve many social engineering and email spoofing tricks. In a phishing attacks the basic purpose of the attacker is to trick the user to believe that the email is legitimate and the website which is asking for the information is also real.
It then lures the user to enter his or her confidential information on this phishing website.
The typical methods deployed in phishing are email and instant messaging. The main targets of phishing attacks are bank’s customers and people using online payment services.