This document summarizes literature on detecting phishing attacks. It begins with an introduction defining phishing and explaining the broad scope of the problem. It then outlines the document's objectives and various definitions related to phishing. Several techniques for mitigating, detecting, and evaluating phishing attacks are discussed, including user training, software classification, offensive defense, correction approaches, and prevention. Evaluation metrics and examples of detection methods like passive/active warnings, visual similarity analysis, and blacklists are also summarized. The conclusion recommends education as the best defense and outlines common characteristics of phishing attacks.