Yahoo Web Search

Search results

  1. Dictionary
    phish·ing
    /ˈfiSHiNG/

    noun

    • 1. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers: "an email that is likely a phishing scam"

    More definitions, origin and scrabble points

  2. Phishing is a type of social engineering and cybersecurity attack where the attacker impersonates someone else via email or other electronic communication methods, including social networks and Short Message Service ( SMS) text messages, to reveal sensitive information.

  3. en.wikipedia.org › wiki › PhishingPhishing - Wikipedia

    Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware.

  4. Phishing is a cybercrime that uses fake emails, websites or messages to trick people into sharing personal or financial data. Learn how to recognize phishing attempts, protect yourself and your organization, and take a free phishing security test.

  5. Phishing is the practice of tricking Internet users into revealing personal or confidential information which can then be used illicitly. Learn the etymology, history, examples, and related terms of phishing from Merriam-Webster, America's largest dictionary.

  6. Phishing is a type of cyberattack designed to deceive people into revealing sensitive information. Learn how to prevent phishing from harming your organization.

  7. Phishing is a cyberattack that uses fraudulent messages to trick people into sharing sensitive data or downloading malware. Learn about the common types of phishing attacks, such as bulk email phishing, spear phishing and business email compromise, and how to protect yourself and your organization.

  8. Phishing is a cyber attack that tricks users into revealing sensitive information or clicking malicious links. Learn how phishing works, what types of attacks exist, and how to protect yourself and your organization from phishing threats.

  1. People also search for