The term phishing it is used in the field of computing to allude to a crime which is carried out from the identity replacement of a user. Through fraudulent action, a criminal gets confidential data that explodes to your advantage.
Phishing can lead to the criminal access bank account numbers or credit cards , for example. With that data in your possession, you are able to steal money of the accounts or of using those amounts to make purchases without the legitimate owner of the resources noticing.
Many times phishing is done through a email which seems to come from a source of trust (a company, a government office, etc.), when in reality it is a fake message . These emails usually have a link to a site where the victim, deceived, enters his personal information and provides it, without knowing it, to the offender.
Another possibility is that the individual arrives at a fraudulent website by another means, such as a communication from instant messaging or even a seeker . In appearance, the site seems to belong to a company or agency of government , but it is nothing more than a facade for data theft.
To avoid phishing, keep in mind that Business They do not request personal information via email. Because you must not answer unsolicited emails or click on their links . You also don't have to download the attached files. Another important issue is to carefully analyze the addresses (URLs) of the websites, as they are sometimes similar to the original but not identical.