TY - JOUR TI - Phishing Attacks and It's Various Defences AU - Surbhi Sharma AU - Deo Prakash JO - International Journal of Scientific Research in Computer Science, Engineering and Information Technology PB - Technoscience Academy DA - 2018/04/25 PY - 2018 DO - https://doi.org/10.32628/IJSRCSEIT UR - https://ijsrcseit.com/CSEIT411845 VL - 4 IS - 1 SP - 268 EP - 274 AB - Phishing is primarily a venture executed by cybercriminals to gain access to the important information of the users viz. passwords, emails, bank details, corporate stats, etcetera to swindle them. Phishing is somehow related to fishing in a lake, but here instead of capturing a fish, phishers try to steal the information of the unsuspected users. It is predominantly carried through by spamming some fancy trending but fallacious emails which catches the eye of the users and if they proceed into enquiring about it by entering the page and filling in their credentials as asked by the page, they fall into the trap and suffer at the hands of the phishers. Purpose of this disquisition is to identify the various deceiving techniques being exercised by the phishers to purloin the crucial information of their victims. I will also discuss how we can detect various phishing attacks and prevent them from harming you.