This article explains what phishing is and includes tips on how to identify phishing schemes and follow best practices to avoid becoming a victim of online fraud. This article also describes how the Microsoft Office system helps to protect you from phishing schemes.In this article

What is phishing?

Phishing (pronounced "fishing") is an online fraud technique used by criminals to lure you into disclosing your personal information.

There are many different tactics used to lure you, including e-mail and Web sites that mimic well-known, trusted brands. A common phishing practice uses spoofed messages that are disguised to look like they are from a well-known company or Web site, such as a bank, credit card company, charity, or e-commerce online shopping site. The purpose of these spoofed messages is to trick you into providing personally identifiable information (PII), such as the following:

This information is used in many ways for financial gain. For example, a common practice is identity theft, whereby the thief steals your personal information, takes on your identity, and can then do the following:

For tips on how to avoid being the victim of online fraud, see the section later in this article.

Examples and characteristics of phishing schemes

Some examples of phishing schemes include:

There are many more phishing schemes that people are using. For an up-to-date report on phishing schemes that authorities have uncovered, visit the Web site.

Typical characteristics of a phishing scheme

Unfortunately, as phishing attacks become more sophisticated, it is very difficult for the average person to tell whether an e-mail message or Web site is fraudulent. That is why phishing schemes are so prevalent and successful for criminals. For example, many phony e-mail messages and Web sites link to real company logos of well-known brands, so they look legitimate. The following are a few things you can do to help protect yourself:

How can Office help protect me from phishing and homograph attacks?

Suspicious links in documents

By default, the Office release displays security alerts in the following situations:

The following alert appears when you click a link to a Web site that uses a potentially spoofed domain name.

Microsoft Office security notice

You can then choose whether to continue to visit the Web site. In this situation, we recommend that you click No. This functionality helps to protect against homograph attacks. For more information, see .

Suspicious links in e-mail messages

By default, Microsoft Office Outlook does the following to a suspicious message:

If you click a link that was disabled in a phishing message, the following Outlook Security dialog box appears.

outlook security dialog box

If you want to continue to be alerted to potential security risks, click OK. If you don't want to keep getting the warning, select the Please do not show me this dialog again check box.

For more information, see Enable or disable links and functionality in phishing messages.

Best practices to help protect yourself from online fraud

If you need more tips on safer online shopping and banking, visit the Web site.

How do I report online fraud and identity theft?

If you think that you received a fraudulent e-mail message, you can report the problem and attach the suspicious message. Reporting suspicious messages to authorities helps in the effort to combat phishing schemes.

  1. In Outlook, select, but don't open, the message that you want to report.
  2. On the Actions menu, click Forward As Attachment, or press CTRL+ALT+F.
  3. In the To line, type the e-mail address of the company to whom you are reporting the phishing message. Some e-mail addresses that you can use to report suspicious mail are:
  4. click Send.

See also: