Table of Contents
Phishing Is Evolving Fast
Phishing — the practice of tricking people into revealing sensitive information — remains the most common cyberattack. With AI tools generating flawless phishing emails and deepfake voice calls, attacks are harder to detect than ever. Understanding the latest techniques is your best defense.
Types of Phishing
Email Phishing
Mass emails impersonating trusted companies. Red flags include urgent language, mismatched sender domains, generic greetings, and requests to click links or download attachments.
Spear Phishing
Targeted attacks using personal information about you — your name, employer, recent purchases, or social connections. These are much harder to detect because they feel personalized and legitimate.
Smishing (SMS Phishing)
Phishing via text messages. Common examples include fake delivery notifications, bank fraud alerts, and tax refund messages. These often include shortened URLs that hide the real destination.
Vishing (Voice Phishing)
Phone calls impersonating banks, government agencies, or tech support. AI-generated voices can now convincingly mimic real people, making these attacks particularly dangerous.
How to Verify Suspicious Messages
Before clicking any link or providing information:
- Check the sender's actual email address — Not just the display name
- Hover over links — See where they actually lead before clicking
- Contact the company directly — Use the phone number or website from your records, not from the message
- Look for HTTPS — But remember that even phishing sites use HTTPS now
- Be skeptical of urgency — Legitimate companies rarely demand immediate action
- Verify with the sender through a different communication channel
What to Do If You Clicked
If you already clicked a phishing link or provided information:
- Change passwords immediately for any affected accounts using our Password Generator
- Enable two-factor authentication if not already active
- Monitor financial accounts for unauthorized transactions
- Run a malware scan on your device
- Report the phishing attempt to the impersonated company and relevant authorities
Building Phishing Resistance
- Slow down — Phishing exploits urgency. Take time to verify before acting
- Use a password manager — It will not auto-fill credentials on fake websites
- Enable 2FA everywhere — Even if credentials are stolen, 2FA blocks access
- Keep software updated — Patches close vulnerabilities that phishing exploits
- Report phishing — Forward suspicious emails to the company and to reportphishing@apwg.org
The best anti-phishing tool is a healthy skepticism. When something feels urgent or too good to be true, it probably is.
Share this article

Raimundo Coelho
Cybersecurity specialist and technology professor with over 20 years of experience in IT. Graduated from Universidade Estácio de Sá. Writing practical guides to help you protect your data and stay safe in the digital world.