Editorial: Gone Phishing


Column By Mike Bibb

“Phishing is a form of online fraud where attackers attempt to steal sensitive information such as passwords, credit card numbers, or bank account details. This is typically done by sending deceptive emails or messages that appear to be from trusted sources like banks or well-known websites. The goal is to trick the recipient into providing personal information, which the attacker can then use for fraudulent purposes.
How Phishing Works:  Phishing attacks often involve creating fake websites or emails that closely resemble legitimate ones. These fraudulent communications usually contain links or attachments that, when clicked, lead the victim to a malicious site or prompt them to download malware.”


Microsoft Bing

We used to call it “Getting hustled” whenever someone tried to convince us to do or sell something we really didn’t want to do or buy.

Today, we call it “Phishing” — a computer-enabled scamming technique.

With the advent of computers — now on a worldwide scale — a person can be hustled/scammed through infinitely deceptive schemes.  Some are very enticing, even convincing.

I’ve recently experienced an abnormal flow of emails into my inbox informing me I owe various sums of money to multiple outfits; a few I’ve never heard of or done business with.

To lend authenticity to the demands, the senders claim they are from PayPal.  A look-alike PayPal logo is printed on the message, as well as several 1-888 phone numbers I could phone to discuss the issue. 

Admittedly, the notices appear reputable and done in a professionally-looking format.  Obviously, intended to lure a target into their trap.  Similar to casting a hook and bait — phishing. 

These emails have been arriving for about a week, at the rate of two or three a day.  Some are repeats, while others are single messages.  Each, however, contains the same theme — send money or call regarding a debt I’ve allegedly incurred.

If the senders weren’t so persistent in their demands, they might actually be believable.

I suppose the approaching Holiday Season has brought them out in more abundance than normal.  Perhaps, I’ve been selected as a phishing prey more frequently than usual.

Or, they believe, my brain has diminished to the point purveyors of these malicious acts think they can successfully work their cons because of my assumed inability to recognize the deceptions.

Someday that may be the case but not today.

Whatever the reason, it’s an annoying fact of life we have to put up with if we use personal computers.  Attempted robbery/extortion by some unseen individual employing an ordinary device we use in everyday life is not only aggravating but creates a feeling of desperation.

Mostly — in my instance — it pisses me off.

I have the usual computer protection options, and I suppose they function as advertised.  However, I also realize preventing computer fraud is a 24/7 task — a continual struggle with thieves and their conniving ways.

To my way of thinking, if these miscreants can worm their way into the computer systems of large corporations, banks, and government agencies, organizations with the means and abilities to repel electronic invasions but still get hacked, then how resistant can a citizen be who doesn’t possess these extraordinary protections?

As is often the case, it’s up to the private citizen to fend for himself.  By the time help arrives, it might be too late.  The damage is done — the perp has moved on to commit additional wrongdoings in the cyberspace world of computer crime.

“Caveat emptor” is an old Latin phrase meaning “Let the buyer beware.”  In other words, be sure of what you’re buying or agreeing to before you finalize the deal.

The term could also apply to any computer transaction you may be considering.  If you don’t understand the proposition, don’t recall the supposed deed, or don’t believe you’re liable for the claim, don’t continue with the requests of the demand. 

Don’t proceed any further — immediately click off — or go to another site.

Chances are if you owe a legitimate debt, you will be informed by United States Postal Service mail.  Not a computer email from some unknown location.

You can also instruct your computer to refuse acceptance — block — these types of “phishing” requests.  Not sure of the reliability of the procedure, but at least it seems to help.  In the five or six days I’ve been using the feature, I haven’t heard from the previous claimants.

Perhaps, the best recommendation is to simply ignore these kinds of online demands until further proof is presented you may actually be responsible for them.

This isn’t unsolicited legal advice — just common sense.  Besides, my ability to understand legalese is only slightly less than trying to figure out what Kamala Harris is talking about.    

The opinions expressed in this editorial are those of the author.