Phishing is a threat that acquire sensitive information such as username, password etc through online. Phishing often takes place in email spoofing or instant messaging .Phishing email contains messages like ask the users to enter the personal information so that it is easy for hackers to hack the information. This paper presents an overview about various phishing attacks and various techniques to protect the information.
Now a day’s attacks have become major issues in networks. Attacks will intrude into the network infrastructure and collect the information needed to cause vulnerability to the networks. Security is needed to prevent the data from various attacks. Attacks may either active attack or passive attack. One type of passive attack is phishing. Phishing is a continual threat and is larger in social media such as facebook twitter. Phishing emails contain link to the infected website. Phishing email direct the user to the infected website where they are asked to enter the personal information, so that the website will hack the information whatever the user enters. Phishing email is send to large number of people and the phisher will count the percentage of people who read that email and entered the information. It is very difficult to find that we are actually visiting an actual site or malicious site. Phishing is also known as brand spoofing or carding. As a result researchers are attempting to reduce the risk and vulnerabilities.