This document discusses phishing, which is an attempt to acquire personal information like usernames, passwords, and credit card details under false pretenses. It covers common phishing techniques like link manipulation and website forgery. It also discusses types of phishing like deceptive, malware-based, and DNS-based phishing. The document outlines causes of phishing like misleading emails and lack of user awareness. It proposes both technical and social approaches to anti-phishing and examines the effects of phishing like identity theft and financial loss. Finally, it recommends defenses like education and detection tools to counter phishing attacks.