Internet and emails have opened a Pandora's box of fraudulent material into our desktops.
How does a phishing attack happen? To begin with, an email appears as if it came form a trusted source. When you reply to the mail or land on a website, you may be asked for your personal data. If you succumb to this trap then the hacker has access to all your data.
This could be used to sell your information, steal your identity and even funds from your bank account. It may also be used to attack your contacts and their contacts in succession.
US ranks first in developing phishing websites.