This document discusses phishing, which is defined as fraudulently acquiring personal information by tricking individuals into believing the attacker is a trustworthy entity, usually through email or instant messages. It describes how phishers attack by using technical deception to spoof links or including usernames and passwords in web URLs. The document provides tips on how to detect phishing, such as looking for misspelled URLs or @ symbols in addresses. It also discusses the damage caused by phishing, from lost access to substantial financial loss, and concludes that phishing is a decentralized online fraud economy governed by supply and demand.