An anti-phishing method includes the steps of establishing an information
center having a blacklist database, wherein the information center is
liaising with at least an Internet service provider (ISP) through a
communication network; collecting a plurality of phishing sources to be
stored in the blacklist database to form a plurality of blacklist items
therein; and sending the blacklist sources to the Internet service
provider such that when a user of the Internet service provider tries to
access a website source which matches with one of the blacklist items,
the user receives a warning signal to inform the user that the website
address is the phishing source.