Purchase your Section 508 Compliance Support guide now!

Purchase your Section 508 Compliance Support guide now!

Phishing

How They Attack

Phishing Phishing is essentially an online con game and phishers are nothing more than tech-savvy con artists and identify thieves. They use SPAM, malicious Web sites, email messages and instant messages to trick people into divulging sensitive information, such as bank and credit card accounts.

How Do You Know

  • Phishers, pretending to be legitimate companies, may use email to request personal information and direct recipients to respond through malicious web sites
  • Phishers tend to use emotional language using scare tactics or urgent requests to entice recipients to respond
  • The phish sites can look remarkably like legitimate sites because they tend to use the copyrighted images from legitimate sites
  • Requests for confidential information via email or Instant Message tend to not be legitimate
  • Fraudulent messages are often not personalized and may share similar properties like details in the header and footer

How Can You Help

If a legitimate Web page has been misidentified as a known or suspicious phish site, please report this misidentified page to the Symantec Security Response team at Submit false positive phish Web page.

A Norton Authenticated Web page has been verified by Symantec as belonging to the company represented. Please use the Norton Authenticated Request Form for legitimate Web sites you want to be evaluated as Norton Authenticated.