Skip to main content

Phishing and My Personal Commentary


The Definition of Phishing and My Personal Commentary about this problem.


The Oxford pocket dictionary defines phishing as the activity of defrauding an online account holder of financial information by posing as a legitimate company. This is what phishing is known for now in today’s internet driven world but it was not always the case. Phishing actually predates computers.

Some people did it over the phone for years and they called it social engineering.
So why would someone think of phishing some one? There is a simple reason: to exploit people. These people are commonly known as scam artists. What these phishers normally do is send out millions of scam emails posing as something or someone who they are not. Normally they hope for a few people who received the email to respond to them by clicking the fake website and provide them with financial and or personal information. Also, anyone who has an email address is at risk of being phished. People can increase their risk of being targeted if their email is posted on a forum or website.

The people phishing can also get many more email addresses by using a spider. A spider is something that searches through many websites and saves an innumerable number of email addresses, everyone it can find. So, in a nut shell, phishing is very profitable for criminals because, they can attain millions of email addresses and potentially set them up for an attack at relatively no cost to themselves (Beal, 2006).
There are some key factors and elements that one needs to help recognize if they are being phished. This scam often has three key elements or factors that will come about when someone is planning an attack. First, when checking your email and look to see who the email is sent from. It will often be from a legitimate company’s address. If the email address looks suspicious then be wary, but this is an easy obstacle for phishers to climb over. It is very quick and easy for someone to change the “from field” in most email clients to trick the person receiving the emails. Second, the email almost always will contain very similar images or logos that have been copied off of the real company’s website. Third, upon opening the email, it will have a link along with text saying you should click the following link to make sure the personal information is correct. When trying to determine if you are part of a phishing experiment, there are many little things you might want to notice. These include spelling errors, unknown email addresses in text, and often the email headers can have absolutely nothing to do with the company that the email implies to the recipient (Beal, 2006).

 


Being aware of phishing is an important concept people should try to understand. First of all, you do not need to click the text or URL that is stated in the email. If you see a suspicious email, you should delete the email promptly. After deleting the email from your inbox, you should delete your trash can as well. Often you can block the email addresses that are sending you these risky emails. If the message or email looks very legitimate you still need to remember to never click the link or URL in the email. To make sure you are going to the website you anticipated, you should open up your web browser and type in the website manually. Then proceed to type in your personal information on the legitimate website (Beal, 2006).
It is very important to know what to do if you do find a suspicious email that is targeting you to be phished. First, you should notify the company that there are suspicious emails in regard to their company. Often companies will want to know if anyone is using this “phishing” technique with their company’s name. Also, if you find a phishing email you should report the phishing to the Federal Trade Commission. Many local police and investigators also take care and deal with internet phishing (Beal, 2006).
Now that phishing is becoming more common, criminals and scam artists are finding newer ways of targeting innocent people. A new, but becoming more common way of targeting people is the use of phishing and malware combined. Malware makes it where someone has control of the computer being targeted. Social engineering is often a very big part malware. So how does someone get control using malware? People can get control by attaching harmful attachments through emails. In the end, the user of the computer will execute a harmful file or software, and then from there, many different things can be downloaded. Even something as simple as accepting a license agreement can easily download and install malware. There is however a very slow and sometimes pain taking processes of sorting through the megabytes of data that have been collected in this form of attaining information. By combining malware with phishing, much vulnerability exists. The vulnerabilities can turn into things such as worms, viruses, and getting personal information. People often do not realize the effect of malware and phishing and what it can turn into.  This is a major problem that is going on in my personal life right now.  I will admit that I have been feeding into this information because everything has been performed by the use of a computer.

My personal experiences consist of getting scammed out of $16,977 dollars in Western Union Funds from March 13, 2008 through February 21, 2010 by an elite group of people; who have not been apprehended by the authorities and members of law enforcement.  Further, I want to inform all of you that I got scammed again my someone who was using a name of a business woman.  It turns out that she hacked her account.  Anyway, she scammed me out of $1,550 dollars in Western Union Funds from September 2, 2016 through June 30, 2017.  This young lady is of African descent.  However, I have tried to officially find out where my money was picked up.  For instance, if my money was picked up in the United States by people assuming the names of those people who are really involved in my old court case.  I have collected a whole lot of information that these people tend to talk about on a regular basis.  I might have been a Spider that this paper is talking about.  A Spider, according to this paper is like a hoarder.  This is a person who collects a lot of things, but refuse to discards these possessions.  The actual people who scammed me are still living and breathing in an unknown location inside of this world. My accounts and cell phones are used simultaneously by an unknown person or a group of people.  This means that every time that I am online, there is someone who is manually controlling my accounts and using them against me.


Comments

Popular posts from this blog

Have You Ever Wrestled with God

Have you ever wrestled with Satan in the same way that the Man of God Wrestled with Jacob?        I have a very important question to ask everyone right now.  Have you ever wrestled with Satan in the same way that Jacob wrestled with the Man of God?  I am asking this question because I had a flashback recently.  It happened in 1974 when I got into a fist fight with a 15-year-old boy.  We got into a fist fight over a black fisted pick that people used to comb their hair.  I fought this boy because he threatened my manhood over something that he could have purchased for himself.               Next, I fought with this boy because he threatened me with violence.  I might have been younger, but that poor brother was limping after I got finished with him.  He got away on his bike.  I want to inform all of you that this boy was 6 years older than me.  I want to say that I might not have wre...

Matthew 5:23-24

Matthew 5:23-24!! What does this means to all people?         Good Day Everyone!! This is an essay that pertains to the Beatitudes inside of Matthew 5 th -7 th  Chapters.  I have selected two of the Bible verses just to place emphasis.  First, I want to say that this is not very easy for some people to apologize to another person, especially after you have done something wrong to that person.  For me personally, I want to inform all of you that my baby brother called me a homosexual because I am responsible for paying my other brother and a friend’s phone bill each month.  I understand that my brother called me out of my name without just cause.         Next, I want to inform everyone that my brother was out of line for calling me out of my name.  I have confronted him about the problem, but he refuses to reconcile.  Therefore, I am praying for him each and every single day of the we...

God is Watching All of US

    God is watching all of us!!   I know for myself that God has been watching me because He is solely responsible for waking me up this morning.  He watches me because I know that I am not able to get away with anything that I am doing wrong throughout my entire 60 years of existence. Next, I want to inform everyone that I have been a Born Again Christian for 10 years now.  I will admit that I have had my moments when I have acted out by using words that does not make sense.  Lord God, I am asking You; to please forgive me of all of my sins both past and present.  This also includes any sins that I am thinking about inside of my mind, as well as any besetting sins that I have presently. Good Afternoon Lord Jesus!!  How are you doing today?  Fine, I hope.  I want to inform you that I am only a Work in Progress.  The reason why I am saying this is simply because I am not perfect.  I am asking you to please bridle my tongue; so t...