This document summarizes information about phishing attacks, including how they work, common techniques used by phishers, and ways to prevent phishing. It notes that phishing works by deceiving users through fake websites, emails, and URLs that mimic legitimate sites to steal login credentials and private information. Specific phishing methods discussed include visual deception, browser deception, spear phishing, URL redirection flaws, and address bar spoofing. The summary also provides statistics on phishing prevalence and recommendations for technical and user-based defenses against phishing.