Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.3, May 2012 84 Phisher’s database with fake information. This approach significantly minimizes the probability of distinguishing the correct data from the flooded database in order to protect people who have submitted their personal credentials already. However, this approach does not prevent other Internet users from supplying their personal credentials to the phishing website. Raising awareness through training and enforcing policies for suspect emails is also popular approach among corporations and institutions for preventing the damage caused by phishers. However, researchers have found that best phishing sites have fooled 90% of the people during their experiment on various groups of people including academic staff and students at a prestigious American university.