How They Attack
How Do You Know
- Phishers, pretending to be legitimate companies, may use email to request personal information and direct recipients to respond through malicious web sites
- Phishers tend to use emotional language using scare tactics or urgent requests to entice recipients to respond
- The phish sites can look remarkably like legitimate sites because they tend to use the copyrighted images from legitimate sites
- Requests for confidential information via email or Instant Message tend to not be legitimate
- Fraudulent messages are often not personalized and may share similar properties like details in the header and footer
How Can You Help
If a legitimate Web page has been misidentified as a known or suspicious phish site, please report this misidentified page to the Symantec Security Response team at Submit false positive phish Web page.
A Norton Authenticated Web page has been verified by Symantec as belonging to the company represented. Please use the Norton Authenticated Request Form for legitimate Web sites you want to be evaluated as Norton Authenticated.