This document discusses phishing attacks and ways to counter them. It begins with an abstract that introduces the topic of email phishing and its growing security problems. The main body is divided into sections that: 1) explain how phishing attacks work and their typical stages, from creating spoofed websites to tricking victims into providing sensitive information; 2) describe different types of phishing scams like spear phishing, whaling, and pharming; 3) outline warning signs that an email may be a phishing attempt, such as coming from an unknown sender or having odd writing; and 4) suggest awareness and technical solutions to help prevent falling victim to phishing.