
A person or an audio response unit waits to take your account number, personal identification number, password, or other valuable personal data. Phone phishing scams direct you to call a customer support phone number. * They might ask you to make a phone call. Spear phishing is a targeted form of phishing in which an e-mail message might look like it comes from your employer, or from a colleague who might send an e-mail message to everyone in the company, such as the head of human resources or IT. * They might appear to be from someone you know. * They might appear to come from your bank or financial institution, a company you regularly do business with, such as Microsoft, or from your social networking site. Phishing e-mail messages take a number of forms:

They ask for personal data, or direct you to Web sites or phone numbers to call where they ask you to provide personal data. Phishing e-mail messages are designed to steal your identity. A few clues can help you spot fraudulent e-mail messages or links within them.
