By definition, this was a successful phishing attack. But for the writer to say “this is not technically hacking.” is not an accurate statement.. I think the whole objective of hacking and/or phishing is to gain access to something (money and/or PII, etc.) that does not belong to them. Even though the methodologies of hacking and phishing are different the outcome is still the same. The hacker(s) gained “something” that did not rightfully belong to them.
I believe this is a huge scam because phishing is usually done via emails, messages, and or phone calls when a perpetrator is trying to steal money, However hacking is when there is unauthorized intrusion into a computer or a network.
Sheena L. Thomas says
By definition, this was a successful phishing attack. But for the writer to say “this is not technically hacking.” is not an accurate statement.. I think the whole objective of hacking and/or phishing is to gain access to something (money and/or PII, etc.) that does not belong to them. Even though the methodologies of hacking and phishing are different the outcome is still the same. The hacker(s) gained “something” that did not rightfully belong to them.
Sheena L. Thomas says
posted comment in the wrong section.
Mohammed Syed says
I believe this is a huge scam because phishing is usually done via emails, messages, and or phone calls when a perpetrator is trying to steal money, However hacking is when there is unauthorized intrusion into a computer or a network.
Mohammed Syed says
Posted in the wrong section.