phishing was our Word of the Day on 08/17/2007. Hear the podcast!
Theme music by Joshua Stamper ©2006 New Jerusalem Music/ASCAP
Recent Examples of phishing from the Web
The conversation happened weeks before the Democratic National Committee revealed it had been hacked, and about a month after Clinton campaign chairman John Podesta was targeted with a phishing attempt.
Information about someone’s personal or family health history could be used for blackmail or phishing, or help an adversary masquerade as someone else.
In one scenario highlighted, spear phishing emails – which pretend to be from a known or trusted sender – trick organizations into clicking on malicious links, ultimately leading to the encryption or lock down of sensitive files.
The feature that allows users to set a time limit on how long an email is available works by requiring the email's recipient to click a link to view the message, opening up a new attack opportunity for phishing, Li said.
The extension is designed to stop malware being loaded onto PCs from malicious sites, and to prevent phishing emails from being successful.
Russia was eventually blamed for the phishing expedition, for several reasons.
There was no evidence of malware in the phishing email or spam and no other suspicious activity was detected within CareFirst’s systems.
The fact that the Florida Medicaid breach, which may have allowed hackers to access Social Security numbers, patients’ names, addresses, medical information, birth dates, and other information, stemmed from a phishing scam is telling.
These example sentences are selected automatically from various online news sources to reflect current usage of the word 'phishing.' Views expressed in the examples do not represent the opinion of Merriam-Webster or its editors. Send us feedback.
Did You Know?
Phishing is one of the many new computer-related terms that have found their way into the general lexicon over the past decade or so. Its "ph" spelling is influenced by an earlier word for an illicit act: "phreaking." Phreaking involves fraudulently using an electronic device to avoid paying for telephone calls, and its name is suspected of being a shortening of "phone freak." A common phishing scam involves sending e-mails that appear to come from banks requesting recipients to verify their accounts by typing personal details, such as credit card information, into a Web site that has been disguised to look like the real thing. Such scams can be thought of as "fishing" for naive recipients.
legal Definition of phishing
Origin and Etymology of phishing
Seen and Heard
What made you want to look up phishing? Please tell us where you read or heard it (including the quote, if possible).