A method for detection of phishing attempts in received electronic mail
messages includes retrieving the source code, displayed text, and a list
of all specified addresses contained within the source code of a received
electronic message. Visual character normalization is applied to each
specified address to develop all possible address combinations and to
form a normalized address list. The specified addresses are removed from
the normalized address list to create a revised address list, upon which
comparison tests are performed to determine if each address in the
revised address list is from a valid source. The recipient of the
electronic message is informed of any message found to be from an invalid
source.