This document discusses phishing attacks and anti-phishing tools. It begins by defining phishing as fraudulent attempts to steal users' sensitive information by impersonating trustworthy entities. The document then outlines the common steps in phishing attacks, including planning, setup, attack, collection, fraud, and post-attack actions. It describes different types of phishing attacks and analyzes security issues. The document concludes by describing some popular anti-phishing tools, including Mail-Secure and the Netcraft security toolbar.