A variety of technical methods are available to stop phishing attacks reaching consumers or to forestall them from properly capturing sensitive information and facts. Filtering out phishing mail[edit]A whaling assault is comparable to spear phishing, other than which the goal is really a “whale,” or high-profile concentrate on as an alternative