A wide array of technical techniques are available to prevent phishing assaults reaching users or to forestall them from correctly capturing delicate information and facts. Filtering out phishing mail[edit]In a standard fraud these days, the con artist strategies the target by means of SMS or electronic mail. Scammers can also simply call their vic