What Is Phishing?
Phishing is a type of cyberattack where an attacker impersonates a trusted entity to trick you into revealing sensitive information. This could be your login credentials, credit card numbers, social security number, or other personal data. The term comes from the idea of "fishing" for victims, and it remains the most common attack vector used in data breaches today.
Phishing is not a new concept, but the techniques have evolved dramatically. Modern phishing campaigns are sophisticated, well-designed, and often indistinguishable from legitimate communications at first glance. Understanding how they work is the first step toward protecting yourself.
Common Phishing Techniques
Email Phishing
The most traditional form involves mass emails sent to thousands of recipients. These emails typically impersonate banks, social media platforms, shipping companies, or cloud services. They create urgency -- claiming your account has been compromised, a payment has failed, or a package is waiting for you.
Spear Phishing
Unlike mass phishing, spear phishing targets specific individuals. Attackers research their victims on social media and professional networks, then craft personalized messages that reference real projects, colleagues, or events. These are significantly harder to detect because they feel genuinely relevant.
Smishing and Vishing
Phishing has expanded beyond email. Smishing uses SMS text messages, while vishing uses phone calls. You might receive a text claiming to be from your bank with a link to "verify your identity," or a call from someone pretending to be tech support.
Clone Phishing
Attackers take a legitimate email you have actually received, clone it, replace the links or attachments with malicious versions, and resend it. Since the content looks familiar, victims are more likely to trust it.
Red Flags to Watch For
Learning to spot phishing attempts is a skill you can develop. Here are the most reliable warning signs:
- Urgency and threats -- "Your account will be closed in 24 hours" or "Unauthorized access detected." Legitimate companies rarely pressure you with tight deadlines via email.
- Generic greetings -- "Dear Customer" or "Dear User" instead of your actual name. Companies you have accounts with typically address you by name.
- Suspicious sender addresses -- The display name might say "PayPal" but the email address is something like
support@paypa1-secure.com. Always check the actual address, not just the display name. - Mismatched URLs -- The link text says
https://www.yourbank.combut the actual URL points somewhere else entirely. Hover over links before clicking to see the real destination. - Poor grammar and spelling -- While many phishing emails are well-written now, some still contain obvious errors that a legitimate company would never send.
- Unexpected attachments -- Especially
.exe,.zip,.scr, or even.docxfiles with macros. Be cautious of any attachment you did not specifically request. - Requests for sensitive information -- No legitimate company will ask you to send your password, credit card number, or social security number via email.
How to Inspect a Suspicious Link
Before clicking any link in an email, message, or social media post, take these steps:
- Hover over the link without clicking. On desktop, your browser or email client will show the actual URL at the bottom of the screen or in a tooltip.
- Check the domain carefully. Attackers use lookalike domains like
amaz0n.com,g00gle.com, orpaypal-support.xyz. The legitimate domain should be the last part before the top-level domain (.com,.org, etc.). - Look for HTTPS. While HTTPS alone does not guarantee safety, legitimate login pages will always use it. A login page on plain HTTP is a major red flag.
- Use a URL scanner. Services like VirusTotal or Google Safe Browsing allow you to paste a URL and check it against known threats before visiting.
- When in doubt, navigate manually. Instead of clicking the link, open your browser and type the official website address directly. If there is truly a problem with your account, you will see it after logging in normally.
Real-World Phishing Scenarios
The "Account Verification" Email: You receive an email that appears to be from your email provider, stating that your account needs to be verified within 48 hours or it will be deactivated. The email includes a professional-looking button that leads to a fake login page. Everything looks correct except the URL, which uses a slightly misspelled domain.
The "Shared Document" Trap: A colleague appears to share a document with you through a cloud storage service. The email looks legitimate and uses proper branding. However, when you click the link, you are taken to a fake login page that captures your credentials before redirecting you to the real service.
The "Tax Refund" Scam: During tax season, you receive an email claiming to be from the tax authority, stating you are owed a refund. The link leads to a form asking for your personal details, banking information, and social security number.
What to Do If You Clicked a Phishing Link
If you have already clicked a suspicious link, do not panic. Take these steps immediately:
- Do not enter any information. If you landed on a page asking for credentials or personal data, close it immediately.
- Disconnect from the internet temporarily if you suspect malware may have been downloaded.
- Change your passwords for any accounts that may be affected, starting with your email and banking accounts. Do this from a different, trusted device if possible.
- Enable two-factor authentication on all important accounts if you have not already. Check out our guide on Two-Factor Authentication for details.
- Run a full antivirus scan on your device.
- Monitor your accounts for unusual activity over the following weeks.
- Report the phishing attempt to your email provider and, if applicable, to the organization being impersonated.
Tools That Help Prevent Phishing
Several tools and practices can reduce your exposure to phishing attacks:
- Email filtering -- Most modern email providers include built-in phishing detection. Make sure it is enabled and configured properly.
- Browser extensions -- Tools like uBlock Origin and built-in browser protections can warn you about known phishing sites.
- Password managers -- A password manager will only auto-fill credentials on the correct domain. If you visit a phishing page, your password manager will not recognize it, which serves as an additional warning sign.
- DNS-based filtering -- Services that block known malicious domains at the DNS level can prevent phishing pages from loading at all.
- Email authentication protocols -- If you manage a domain, implementing SPF, DKIM, and DMARC makes it significantly harder for attackers to spoof your email address.
Building a Phishing-Resistant Mindset
The best defense against phishing is a healthy skepticism toward unsolicited messages. Before acting on any email, text, or call that asks you to click a link, download a file, or provide information, ask yourself: "Was I expecting this? Does this make sense? Can I verify this through another channel?"
Taking five extra seconds to inspect a link could save you from weeks of dealing with compromised accounts, stolen data, or financial loss. Make it a habit, and encourage the people around you to do the same.