The word phishing was coined around 1996 by hackers stealing America Online accounts and passwords. By analogy with the sport of angling, these Internet scammers were using e-mail lures, setting out hooks to “fish” for passwords and financial data from the “sea” of Internet users. They knew that although most users wouldn’t take the bait, a few likely would. The term was mentioned on the alt.2600 hacker newsgroup in January 1996, but it may have been used earlier in the print journal 2600, The Hacker Quarterly. Hackers commonly replace the letter f with ph, a nod to the original form of hacking known as phone phreaking. Phreaking was coined by John Draper, aka Captain Crunch, who created the infamous Blue Box that emitted audible tones for hacking telephone systems in the early 1970s. By 1996, hacked accounts were called phish, and by 1997, phish were being traded among hackers as a form of currency — people would routinely trade 10 working AOL phish for a piece of hacking software. Adapted from material at www.antiphishing.org Related content news analysis This privacy and compliance threat throws shade at iPhone Mirroring Macs might be collecting information on iPhone apps, threatening privacy and compliance in the workplace. By Jonny Evans Oct 10, 2024 6 mins Apple iOS MacOS how-to How to activate Google's newest Android security enhancements These actively arriving Android security boosters are all too easy to miss — but absolutely worth your while to find. By JR Raphael Oct 08, 2024 8 mins Android Security Google Android opinion Think data leaks are bad now? Wait until genAI supersizes them A group of Harvard students experimented with AI-linked eyeglasses, offering a powerful peek into the AI nightmares coming for IT in 2025. By Evan Schuman Oct 07, 2024 6 mins Data Privacy Generative AI Technology Industry brandpost Sponsored by Dell Technologies and McAfee Why evolving cyber threats mean small businesses are ransomware targets It is simply a myth to believe that cyber criminals do not target smaller businesses amid a sea change in attack strategies. By Laura McEwan Oct 07, 2024 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe