... I clicked upon the link so that I could copy and paste it into Phishtank, it came up with big writing,,,,,"This is a fraud!"
So I guess Bank of America got onto it quickly, and somehow re-directed/intercepted it?
But tomorrow I will bookmark this site and see if I can learn how to decypher them from the headers.
If you use webmail, you can easily see if the site matches the address claimed for it by looking in your browser's status bar (that's the bar at the bottom of the window). You can display it in Safari by going to the View menu and selecting "Show status bar". Then when you mouse over the link, its address will show up in the status bar. Just for instance:
http://www.paypal.com. You'd think you were going to Paypal, but it takes you to ebay. You can also check it out with the links in my .sig. The other way to see it without actually going to the site is to use "view source" which will display the html code. (Works for email too) It's safer than going to the site, especially if you're on a poorly protected Windows system, because sometimes the phishing site will also try to, er, "donate" a bit of malware to you.
Be aware that sometimes the (real) site listed in the email is only a redirector or a domain pointed to another domain. Here's an example of pointing:
Help Cure Cancer - if you mouse over it you'll see foldforlife.com in the status bar, but clicking on it takes you to teammacosx.com. (Foldforlife was a domain name I bought for the folding project, but never got round to developing... it's totally legit.) Often a phisher will use a free geocities or yahoo page as a redirector. When they lose the free page, it's no big deal, because their real payoff page somewhere else is untouched.
Concerning the "This is a fraud!" message you saw - that would have been the webhosting company's response to notification of the phishing site. A responsible host will take down the phishing site, put up a warning and of course cancel the offending user's account. The host could have found out about it from your note forwarded by BOA, from a direct report to their abuse admin by someone else who saw the phishing mail, or by scanning their clients' webpages for suspicious content. In any case, hats off to them for a quick and very appropriate response.