Phishing is a type of online scam where a criminal pretends to be a trusted person or organization—such as a bank, school, delivery company, or social media platform—to trick people into revealing sensitive information like passwords, card details, or login codes.
The attacker’s goal is usually stealing accounts, identities, or money.
Simple Definition
Phishing = Fake message + Pretending to be trusted + Stealing information
It relies more on deception and psychology than on technical hacking.
Common Types of Phishing
1. Email Phishing
Fraudulent emails that look like they come from real companies or institutions.
2. SMS Phishing (Smishing)
Scam text messages asking you to click a link or make a payment.
3. Voice Phishing (Vishing)
Phone calls from someone pretending to be customer support, a bank officer, or a government official.
4. Fake Websites
Web pages that copy the design of real sites to steal login credentials.
Real-Life Style Examples
Example 1 – Fake Bank Alert
You receive an email saying:
“Your bank account has been suspended. Click here to verify immediately.”
The link opens a page that looks exactly like your bank, but it’s fake.
If you enter your username and password, the attacker captures them and can access your account.

Example 2 – Social Media Login Warning
A message appears:
“We noticed unusual activity on your account. Reset your password now.”
You click the link and land on a fake login page that steals your password as soon as you type it.
Example 3 – School or Exam Result Link
A student receives:
“Download your exam results here.”
The attachment may contain harmful software, or the link leads to a page designed to collect login details.
Example 4 – Delivery Text Message
A text message says:
“Your package is waiting. Pay a small delivery fee now.”
The payment page is fake and designed to collect card information.
Warning Signs of Phishing
- Urgent language like “Act now” or “Account will be closed”
- Spelling and grammar mistakes
- Suspicious sender addresses
- Links that look slightly wrong (for example, letters swapped or extra characters)
- Requests for passwords, PINs, or one-time codes
- Unexpected attachments or downloads
How to Protect Yourself
- Never share passwords or verification codes
- Double-check the sender’s email address or phone number
- Hover over links to preview the real URL before clicking
- Visit official websites directly instead of using links in messages
- Enable Two-Factor Authentication (2FA)
- If unsure, confirm with a trusted adult, teacher, or IT support
Final Thought
Phishing succeeds by exploiting trust and urgency, not by breaking complex systems.
The strongest defense is awareness, patience, and verification before clicking or entering personal information.