Finished! Looks like this project is out of data at the moment!

See Results

We've updated our Results page! Click on About and take a look at how you've helped Phish Finders learn more about cybercrime!

FAQ

FAQ

What types of phishing are there?

Although there are many different phishing tactics out there, we're looking at phishing from three of the more common angles: e-mails, websites, and links. We're asking that you mark suspicious items with the colored bounding square that best matches your selection of a suspicious or malicious item. If you have marked the image with any bounding squares, please select the "Malicious Site" button to indicate that you do not trust that the image is of a real website or e-mail.

Why do I need to rate trustworthiness and aesthetics?

Bad actors are getting better and more sophisticated in their phishing techniques. While some of the phishy content can be easier to spot, some of it is not that easy to pick out. So, we ask you to rate trustworthiness and aesthetics of the image content to measure how good the bad sites are at fooling us into believing they're real.

Do all of the images contain phishing?

No. There will be images of sites that do not contain malicious content. When you find those images, please select the "Legitimate Site" button to indicate that you trust that the image is of a real website or e-mail.

Keep in mind, however, that all of the website content contained in this project has been obtained for research purposes only. As a result, all content therein has been fictionalized and in no way infers access to any of the products and services depicted in these images. As a result, all website content found in this project does NOT represent the actual intent of the site as originally published and should not be considered authentic content in that regard.

How can you use images of copyrighted material?

All images of website content were obtained through the Internet Archive Project (https://archive.org/) and are subject to the terms and conditions of using that site to collect data. Any objections to inclusion of material that we have used from the Internet Archive should follow their policy (accessible at https://archive.org/about/terms.php), but you can notify us as well that you would like specific content removed by email to (hrosser@unomaha.edu).

Images of email content were collected by individuals and then donated as personal property to the named researchers of PhishFinders and are now considered the property of the research team for use in this and other projects studying internet phishing.