Tag Archives: Cyber Attack

Can Greeting Photos + Videos Hack Your Phone?!

Can Greeting Photos + Videos Hack Your Phone?!

Can hackers use greeting photos and videos to hack your phone, and steal your data?

Take a look at the viral claim, and find out what the FACTS really are!

 

Claim : Greeting Photos + Videos Can Hack Your Phone!

People keep sharing this warning about greeting photos and videos, which claims that they can hack your phone and steal your data.

It’s a long message, so just skip to the next section for the facts!

Hello Family and friends,

Starting tomorrow, Please do not send network pictures. Look at the following article to understand. I’m going to stop too.

Please delete all photos and videos of Good morning, Evening and other greetings and religious messages as soon as possible. Read the following article carefully and you will understand why.

Read all! Please send this message urgently to as many friends as possible to prevent illegal intrusion.

 

Truth : Greeting Photos + Videos Cannot Be Hack Your Phone!

Many of us get spammed with Good Morning, Good Afternoon, Good Evening photos and videos every day from family and friends.

While they often clog up Facebook, Telegram and WhatsApp groups, they really cannot hack your phone. Here are the reasons why Good Morning messages are very irritating, but harmless…

Fact #1 : Shanghai China International News Does Not Exist

The news organisation that was claimed to be the source of this warning – Shanghai China International News –  does not exist!

Fact #2 : Greeting Photos + Videos Not Created By Hackers

Hackers (from China or anywhere else) have better things to do than to create these greeting photos and videos.

They are mostly created by websites and social media influencers for people to share and attract new followers.

Fact #3 : No Fraud Involving Greeting Photos / Videos

There has been no known fraud involving Good Morning or Good Night messages, videos or pictures.

Certainly, half a million victims of such a scam would have made front page news. Yet there is not a single report on even one case…. because it never happened.

Fact #4 : Image-Based Malware Is Possible, But…

Digital steganography is a method by which secret messages and other data can be hidden in digital files, like a photo or a video, or even a music file.

It is also possible to embed malicious code within a Good Morning photo, but it won’t be a full-fledged malware that can execute by itself.

At most, it can be used to hide the malware payload from antivirus scanners, which is pretty clever to be honest…

Fact #5 : Image-Based Malware Requires User Action

In January 2019, cybercriminals created an online advertisement with a script that appears innocuous and would pass any malware check.

However, the image itself has an “almost white” rectangle that is recognised by the script, triggering it to redirect the user to the cybercriminals’ website.

Once there, the victim is tricked into installing a Trojan disguised as an Adobe Flash Player update.

Such a clever way to bypass malware checks, but even so, this image-based malware requires user action.

You cannot get infected by the Trojan if you practice good “Internet hygiene” by not downloading or installing anything from unknown websites.

Fact #6 : Malicious Code Executes Immediately

If you accidentally download and trigger malware, it will execute immediately. It won’t wait, as the hoax message claims.

Deleting Good Morning or Good Night photos or videos will free up storage space in your phone, but it won’t prevent any malware from executing.

There is really no reason for malware to wait before it infects your devices. Waiting will only increase the risk of detection.

Whether the malware serves to take over your device, steal your information or encrypt it for ransom, it pays to do it at the first opportunity.

Now that you know the facts, please SHARE this article with your family and friends!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | Fact CheckTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Malaysia Police Denies Running Political Troll Farm!

The Royal Malaysia Police (PDRM) denies running a troll farm to corrupt or manipulate public discourse!

Here is what you need to know!

 

Meta Accuses Malaysia Police Of Running Political Troll Farm!

On 4 August 2022, Meta directly named the Royal Malaysia Police (PDRM) as being responsible for a troll farm designed to “corrupt or manipulate public discourse“.

Here were the key findings that the Meta team revealed about the individuals behind the PDRM troll farm :

  • They were active on Facebook, TikTok, Twitter and Instagram.
  • They posted memes in Malay, in support of the current government coalition
  • They posted claims of corruption amongst the current government coalition’s critics
  • They created Facebook Pages that posed as independent news entities, and promoted police while criticising the opposition.
  • Their posting activity were greatest during weekdays, taking breaks for lunch.
  • Their fake accounts were under-developed, and some of them used stolen profile photos.

The troll farm was initially suspected to have originated in China by researchers at Clemson University in South Caroline. But when the Meta team investigated it, they found links to the Royal Malaysia Police (PDRM).

Read more : Meta Accuses PDRM Of Running Political Troll Farm!

The Meta team also revealed that the PDRM troll farm spent about $6,000 (~RM26,750) in Facebook and Instagram ads, paid for primarily in Malaysian Ringgit.

They also shared how successful the PDRM troll farm was in garnering followers on Facebook and Instagram :

  • Facebook Pages : About 427,000 accounts
  • Facebook Groups : About 4,000 accounts
  • Instagram Accounts : About 15,000 accounts

As a result of their investigation, Meta removed 595 Facebook accounts, 180 Pages, 11 Groups and 72 Instagram accounts that were linked to this PDRM troll farm, for violating their police against “coordinated inauthentic behavior“.

What Is Inauthentic Behavior?

Inauthentic behaviour (IB) as an effort to mislead people or Facebook about about the popularity of content, the purpose of a community (i.e. Groups, Pages, Events) or the identity of the people behind it. It is primarily centered around amplifying and increasing the distribution of content, and is often (but not exclusively) financially motivated.

IB operators typically focus on quantity rather than the quality of engagement. For example, they may use large numbers of low-sophistication fake accounts to mass-post or like their content — be it commercial, social or political. They often use tactics similar to other large-scale online activities, like spam.

This behavior pattern distinguishes IB from Coordinated Inauthentic Behavior (CIB) where operators invest in mimicking human social activity as closely as possible.

 

PDRM Denies Meta Accusations Of Running Political Troll Farm!

On 6 August 2022, PDRM issued a short notice (with my English translation) stating that it takes Meta’s allegations seriously, denies them, and is currently gathering information about those allegations.

Penafian PDRM Atas Dakwaan Syarikat Meta Platforms Incorporated

Police Diraja Malaysia (PDRM) memandang serius laporan pihak syarikat Meta Platforms Incorporated yang mendakwa terdapat akaun-akaun palsu di media sosial yang “mempunyai hubungan dengan PDRM”.

PDRM menafikan dakwaan tersebut dan sedang mengampul maklumat lanjut mengenainya.

PDRM Denies Allegations By Meta Platforms Incorporated

The Royal Malaysia Police (PDRM) is taking seriously the report by Meta Platforms Incorporated which claimed that there are fake social media account “with ties to PDRM”.

PDRM denies these allegations and is gathering more information about it.

 

PDRM Troll Farm : Is That Even Legal?!

The Royal Malaysia Police (PDRM) enforces the laws of the country, including the Internet. In fact, they have a Cyber & Multimedia Criminal Investigation Unit under the Commercial Crime Investigation Department.

The PDRM works together with the National Cyber Security Agency (NACSA) to tackle cybersecurity threats, and these would include malicious influence campaigns.

All the more reason why it is both perplexing and troubling that Malaysia’s national police force has been linked to a troll farm designed to promote the current government coalition, while denigrating the opposition.

These are specifically the cybercrimes that NACSA should be looking out for, and the PDRM should be assisting them in arresting anyone in Malaysia who participated in such activities.

The PDRM will no doubt be under tremendous pressure to explain / refute Meta’s allegations.

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | BusinessTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

FBI + MI5 Issue Joint Warning On Chinese Spying!

The FBI and MI5 just issued a joint warning about economic spying and hacking operations by the Chinese government!

Here is what you need to know…

 

FBI + MI5 Issue Joint Warning On Chinese Spying!

On July 7, 2022, FBI Director Christopher Wray joined MI5 Director General Ken McCallum at the MI5 London headquarters to issue a joint warning about Chinese spying and cyberattacks.

Ken McCallum said that MI5 was running seven times as many investigations into China, as it had just four years ago. He also said that MI5 planned to double that to tackle the widespread attempts.

Christopher Wray, on the other hand, stressed that the FBI had substantially increased its investigations into China, and is currently managing about 2,000 problems, and opening about two counterintelligence cases every day.

The Chinese government is set on stealing your technology – whatever it is that makes your industry tick – and using it to undercut your business and dominate your market.

Maintaining a technological edge may do more to increase a company’s value than would partnering with a Chinese company to sell into that huge Chinese market, only to find the Chinese government and your partner stealing and copying your innovation.

Both McCallum and Wray alleged that the Chinese government is engaged in a “coordinated campaign” to “cheat and steal [technology] on a massive scale“.

They also stressed that China’s hacking programme dwarfs that of any other major country, and that it has a global network of intelligence operatives.

 

FBI + MI5 : China Also Preparing To Shield From Sanctions

Even more worrying is the fact that China is working to shield its economy from any future sanctions, obviously learning from how the West punished Russia for invading Ukraine.

This suggests that China is at least preparing for the possibility, if not the eventuality, of insulating its economy from potential sanctions, should it attack Taiwan.

Wray said that China is “trying to cushion themselves from harm if they do anything to draw the ire of the international community”, and that the Chinese government is pressuring Western businesses not to criticise Beijing or its policies.

He declined to say whether an invasion of Taiwan has become more likely due to these measures, but warn that Western investments in China could be similarly impacted by such a conflict.

Just as in Russia, Western investments built over years could become hostage, capital stranded. Supply chains and relationships disrupted.

Wray also shared that the Chinese government had directly interfered in a New York congressional election, because they did not want a candidate who was a critic and a former Tiananmen Square protestor to be elected.

China has for far too long counted on being everybody’s second-highest priority. They are not flying under the radar anymore.

Both Wray and McCallum said that the intention of the joint address was to “send the clearest signal” to the Chinese Communist Party (CCP), because if China decides to invade Taiwan, it would cause “one of the most horrific business disruptions the world has ever seen“.

Read more : US Mil Contractor Admits Selling Aviation Secrets To China!

 

FBI + MI5 : Examples Of Chinese Spying

McCallum shared some specific cases of Chinese spying activities that MI5 detected and thwarted.

Covert Theft

Late last year Chinese intelligence officer Shu Yenjoon was convicted in a US court on charges of economic espionage and theft of trade secrets from the US aviation sector.

Shu was active in Europe too: he’d been part of a prolific Ministry of State Security network targeting the aerospace sector.

MI5 worked with those being targeted in the UK to mitigate the risks until the FBI action could solve the problem for both of us.

Tech Transfer

Clandestine espionage methodology isn’t always necessary. Take the tale of Smith’s Harlow, a UK-based precision engineering firm. In 2017 Smith’s Harlow entered into a deal with a Chinese firm, Futures Aerospace. The first of three agreed technology transfers saw Futures pay £3m for quality control procedures and training courses.

You know how this ends: after further sharing of valuable IP, Futures abandoned the deal. Smith’s Harlow went into administration in 2020. As their Chairman put it: “They’ve taken what they wanted and now they’ve got it, they didn’t need the shell of Smith’s”.

Information Advantage

The CCP doesn’t just use intelligence officers posing as diplomats in the classic fashion. Privileged information is gathered on multiple channels, in what is sometimes referred to as the ‘thousand grains of sand’ strategy.

In Germany a retired political scientist and his wife who together ran a foreign policy think tank passed information to the Chinese intelligence services for almost ten years.

In Estonia a NATO maritime scientist was convicted for passing information to his Chinese handlers, who claimed to be working for a think tank.

Cultivating New Contacts

The deceptive use of professional networking sites is well known. Seemingly flattering approaches turn into something more insidious – and damaging.

In one example a British aviation expert received an approach online, ostensibly went through a recruitment process, and was offered an attractive employment opportunity. He travelled twice to China where he was wined and dined. He was then asked – and paid – for detailed technical information on military aircraft. The ‘company’ was actually run by Chinese intelligence officers.

Read more : China Should Worry About Russia Invading Ukraine!

 

Chinese Response To FBI + MI5 Spying Allegations

Chinese government officials naturally rejected spying allegations by the FBI and MI5.

A spokesman for the Chinese embassy in Washington, Liu Pengyu, called the accusations groundless and said that China “firmly opposes and combats all forms of cyber-attacks“, and would “never encourage, support or condone cyber-attacks“.

His statement also said that the Taiwan issue was “purely China’s internal affair” and that there was “no room for compromise or concession“. It also said that China “will strive for the prospect of peaceful reunification with utmost sincerity and efforts“, but noted that China would “reserve the option of taking all necessary measures in response to the interference of foreign forces“.

Chinese foreign ministry spokesperson Zhao Lijian did not address the claims directly, but accused the United States of being the real danger instead.

The relevant US politician has been playing up the so-called China threat to smear and attack China. Facts have fully proven that the US is the biggest threat to world peace, stability and development.

We urge this US official to have the right perspective, see China’s developments in an objective and reasonable manner and stop spreading lies and stop making irresponsible remarks.

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | EnterpriseTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Did Hackers Release Pfizer + Moderna Vaccine Death Data?!

Did hackers just crack the Pfizer and Moderna servers, and publicly released the hidden vaccine death data that they stole?!

Take a look at the viral claim, and find out what the facts really are!

 

Claim : Hackers Stole, Released Pfizer + Moderna Vaccine Death Data!

People are sharing links to articles that claim that hackers just stole and released vaccine death data from Pfizer and Moderna servers!

Here is an example, which is rather long, so feel free to skip to the next section for the facts!

GOOD NEWS!!!! Hackers broke into all the pharmaceutical companies and stold all the medial data on vaccines thank God!!!! The Great Awaking has lifted off!!! Forward this link everywhere!!!!

**Displays number of deaths and disabilities associated with each batch/lot number = indication of relative toxicity of one batch/lot compared to another
**No one currently knows the reason why some batches/lots are associated with excessive deaths, disabilities and adverse reactions (up to 50 x). Until we do know, it is best to be cautious
**[“Batch-code” = “Lot Number” = the number they write on your vaccination card.]

 

Truth : Hackers Did Not Steal / Release Pfizer + Moderna Vaccine Death Data!

This is yet another example of FAKE NEWS created and promoted by disinformation websites like Before It’s News, How Bad Is My BatchBest News Here, and here are the reasons why…

Fact #1 : Pfizer + Moderna Servers Were Not Hacked

Those websites falsely claimed that hackers broke into Pfizer and Moderna servers, and stole their (hidden) vaccine death data.

There is no evidence the Pfizer and Moderna servers were ever hacked, or had any data stolen.

Fact #2 : All Data Are Publicly Available

Despite claiming at the start that the data provided in the website was stolen from Pfizer and Moderna servers, the article ends with a statement that all of the data was really sourced from VAERS.

Data Source
• All data is sourced from VAERS, a public database of over 700,000 adverse reaction reports for Moderna, Pfizer and Janssen Covid 19 vaccines in the USA. 
Our intention is to present the VAERS data in an accessible and unadulterated form, that can be easily verified using the links below

In other words – they falsely claimed that the data was provided by hackers who broke into Pfizer and Moderna servers. The data were all from VAERS, which is publicly available.

Fact #3 : VAERS Data Cannot Be Used As Evidence

Like the British Yellow Card system, VAERS is an open reporting system that lets ANYONE from ANYWHERE file a report, without verification.

VAERS reports are not only easily faked, they are easily abused, which why the CDC explicitly warned that :

  • Reports may include incomplete, inaccurate, coincidental and unverified information.
  • The number of reports alone cannot be interpreted or used to reach conclusions about the existence, severity, frequency, or rates of problems associated with vaccines.

But anti-vaccination activists and disinformation websites LOVE to use VAERS, because they can easily manipulate the reports to create a fake narrative.

Read more : Here’s How Antivaxxers Create Fake News Using VAERS!

Fact #4 : Pfizer + Moderna Released Their Data In 2020

Both Pfizer and Moderna submitted data from their COVID-19 vaccine clinical trials to health authorities across the world, like the US FDA and EMA in Europe in November 2020.

The release of clinical trial data, which would include post-vaccination adverse events, is necessary for any health authority to approve their vaccines.

The US FDA released the briefing documents Pfizer and Moderna submitted to the Vaccines and Related Biological Products Advisory Committee (VRBPAC) in December 2020 :

Fact #5 : FDA Started Releasing Pfizer Documents In 2021

On 27 August 2021, a group that called themselves Public Health and Medical Professionals for Transparency (PHMPT) filed a Freedom of Information Act (FOIA) request with the US FDA to gain access to all of their documents related to the Pfizer COVID-19 vaccine.

The US FDA started releasing the Pfizer documents on 17 November 2021. They were then ordered by US District Judge Mark Pittman to speed up the release of those documents on 6 January 2022.

As of 2 May 2022, the US FDA had already released 238 documents related to the Pfizer COVID-19 vaccine, containing thousands of pages.

Read more : Did Pfizer Try To Hide 158K Vax Adverse Events For 75 Years?

Fact #6 : Before It’s News Is Known Fake News Website

Before It’s News is known for creating and spreading fake news – not just misinformation, but also disinformation about everything from MH17 conspiracy theories to anti-vaccination claims.

Everything posted by Before It’s News must be considered FAKE NEWS, until proven otherwise.

Please help us FIGHT FAKE NEWS by sharing this fact check article out!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Science | Fact CheckTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Scam Alert : Nespresso 2022 Mother’s Day Contest!

Please watch out for the Nespresso 2022 Mother’s Day contest scam!

Find out why it is just a SCAM, and WARN your family and friends!

 

Scam Alert : Nespresso 2022 Mother’s Day Contest!

People are now sharing the Nespresso 2022 Mother’s Day Contest scam on WhatsApp :

Nespresso 2022 Mother’s Day Contest

5,000 free coffee machines for your Mother!

 

Nespresso 2022 Mother’s Day Contest : Why This Is A Scam!

Many of us are in dire straits during this COVID-19 pandemic, having lost jobs, income or even loved ones.

Unfortunately, scammers are counting on our desperation to prey on us, using the same survey scam they have been using for years :

Unfortunately, this Nespresso contest is yet another SCAM that you should NEVER participate in!

  1. After you click on the link, you are taken to a page that looks like a genuine Nespresso contest page.
  2. You will be asked to answer three very simple questions.
    The answers are irrelevant – no matter what you answer, you are always allowed to proceed to the next step.
  3. You are then asked to share the promotion with 30 WhatsApp contacts, or 5 WhatsApp groups.
  4. Next, you will be asked to complete one of these tasks to receive the “free” Nespresso coffee machine :
    a) install an app, which is really a malware to send you advertisements, or
    b) enter your credit card details
    Needless to say – proceeding with this step will open you up to great risk of monetary loss. DO NOT PROCEED!
  5. If you install their malware, you will start receiving promotions, some of which will ask you to send an SMS to receive expensive free gifts like laptops and smartphones.
    If you proceed to send the confirmation SMS messages, you will be subscribed and billed for international premium SMS services.

So never click on such contest links, even if they were sent to you by a trusted relative or friend.

They would have certainly been fooled by the scam, so please warn them too!

 

How To Spot Scams Like The Nespresso Survey Contest!

Now, let me show you how to spot these scams next time!

If you spot any of these warning signs, DO NOT PROCEED and DO NOT SHARE!

Warning Sign #1 : Bad Grammar

Most of these scammers do not have a good command of the English language, so if you spot bad grammar, stay away.

Proper contests or events sponsored by major brands like Nespresso will have at least one PR or marketing person who will vet the text before allowing it to be posted.

Read more : Watch Out For Nestle 2022 Anniversary Phishing Scam!

Warning Sign #2 : Offering You Free Money Or Gifts

Please do NOT be naive. No one is going to give you money or free gifts just to participate in a survey!

Petronas isn’t going to give you FREE money, just because it’s their anniversary.

They are a corporation whose business is to make money, not a charity to give you free money.

Warning Sign #3 : Not Using The Real Jaya Grocer Domain

A genuine Petronas campaign would use their real domain – www.petronas.com.

Or they would run it off the official Petronas page on Facebook – www.facebook.com/petronas/.

If you see nonsensical domains like 0yjjg61.cn, 1eaf1rnbeef.top, ldxqw.bar, etc. that’s a sign of a SCAM!

Warning Sign #4 : Asking You To Forward The Offer

No brand will insist that you must share the offer with 5 groups or 20 friends on WhatsApp.

Do not click to forward their offer to your family and friends. They will not appreciate being scammed with your help!

Warning Sign #5 : Asking You To Download + Register An App

If you click through and joined the fake survey scam, you will eventually be asked to download and register for an app.

This is VERY DANGEROUS. Never agree to download and register for any unknown app from a website.

Always download your apps from an official App Store like Google Play Store (for Android smartphones) and Apple App Store (for iPhones).

Please help us fight scams like this and SHARE this article out!

And please WARN your family and friends!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | Home TechTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

US Homeless Setting Up Tent + Robbing People In Subway?!

Are homeless people in the US setting up tents and robbing passengers on subway trains?!

Take a look at the viral video, and find out what the facts really are!

 

Claim : US Homeless Are Setting Up Tent + Robbing People In Subway!

People are sharing a video of homeless people in the US setting up their tent in the middle of a subway train, and then a homeless man rob another subway passenger of his food.

It is being actively shared in pro-China groups, and by pro-China social media accounts, together with messages like these :

US homeless has moved into the subway. The US homeless has moved into the subway car, and is also robbing other passengers for food in the subway car. The US government should spend more time dealing with domestic problems, instead of going abroad to set fires everywhere. Really US have degenerated to such sad state very depressing 👇👇

PRC.Forces0 : #Homeless couple camp in #NYC subway, snatching food from other passengers.

Such shameful story in US.

 

Truth : US Homeless Are NOT Setting Up Tent + Robbing People In Subway!

This is yet another example of FAKE NEWS created and/or propagated by the Chinese 50 Cent Army (wumao, 五毛), and here are the reasons why…

Fact #1 : It Was A Staged Prank Video

The video was a staged comedy prank by American comedians Esteban Hashtag Tino Romero, and Smiley Hundo.

The video was originally posted by Tino Romero on his @Pundamoniums Instagram account on 12 January 2022.

Smiley Hundo also posted it on YouTube as a short video on 2 March 2022, calling it Homeless Couple Takes Man Food On NYC Train.

Fact #2 : Tino Romero Is Famous For Prank Videos

Tino Romero is famous for participating in pranks and stunts in New York City.

In July 2021, one of his videos went viral, showing him taking a dump into a NYC sanitation worker’s mop bucket!

Of course, that video was also staged – the MTA worker was Morris Cornbread, another New York City-based comedian.

That same video was also used by the Chinese 50 Cent Army as “evidence” of how far American society has fallen. It was a kind of payback for videos of Chinese citizens pooping in public that went viral years earlier.

Fact #3 : New York City Subway Is Patrolled By NYPD

The video appears to spread quickly amongst people who have never been to the United States, and are therefore unaware that the New York City subway is patrolled by the New York City Police Department (NYPD).

NYPD officers patrol the stations, and ride the trains to help prevent crime. They also make sure homeless people do not stay in the subway stations, or sleep on the train.

Therefore, it is impossible for homeless people to actually set up a tent in the middle of a subway train. NYPD officers on patrol would certainly evict them from the train.

Fact #4 : Homelessness Is A Problem Globally

While the video was staged, it is true that homelessness is a problem in the United States, and in particular, New York City which boasts some of the most expensive real estate and rental rates in the world.

But this is not an exclusively American problem. Homelessness is a global problem, affecting many countries around the world – rich and poor alike.

Ignoring wars and conflicts that displace people, here is the top 6 list of countries with the most homeless people:

  • Nigeria : 1.66%
  • Honduras : 1.24%
  • Egypt : 1.20%
  • Pakistan : 0.94%
  • Zimbabwe : 0.85%
  • Philippines : 0.42%

Instead of mocking the homeless, perhaps we should be grateful that we have a home to live in. Many people around the world don’t.

 

Why Create Fake Stories About Homeless People In US?!

With China’s aggressive foreign stance in recent years, it is not uncommon to see such fake stories being created and shared by the Chinese 50 Cent Army, and pro-China netizens.

These fake stories are being created to drown out the negative coverage of China’s controversial Belt and Road Initiative, and its aggressive moves in the South China Sea.

The Wumao have also been actively creating fake stories to support Russia’s invasion of Ukraine.

Whatever the reasons may be, it is our duty as global citizens to stop the proliferation of such fake stories.

Please share this fact check with your friends, so they know the truth!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | Travel | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Anonymous Affiliates Are Attacking Russian Space Agency!

After Anonymous declare a cyberwar against Russia, their affiliates are going after the Russian space agency, Roscosmos.

Here is what they accomplished so far!

 

Anonymous Affiliate NB65 Attacked Russian Space Agency!

On 28 February 2022, the hacking group – Anonymous Network Battalion 65′ (NB65), which hacked and released over 40,000 files from the Russian Nuclear Safety Institute.

They then turned their attention to the Russian Space Agency, claiming to shut down the WS02 Vehicle Monitoring System server at the Roscosmos Control Center on 1 March 2022.

The Russian Space Agency sure does love their satellite imaging.

Better yet they sure do love their Vehicle Monitoring System.

The WS02 was deleted, credentials were rotated and the server is shut down.

Network Battalion isn’t going to give you the IP, that would be too easy, now wouldn’t it?

Have a nice Monday fixing your spying tech. Glory to Ukraine.

We wont [sic] stop until you stop dropping bombs, killing civilians and trying to invade.

Go the fuck back to Russia.

However, Roscosmos Chief Executive, Dmitry Rogozin denied the claim, saying that “The information of these scammers and petty swindlers is not true. All our space activity control centers are operating normally.

 

Anonymous Affiliate v0g3lSec Hacked Russian Space Agency Website!

On 3 March 2022, another Anonymous affiliate, v0g3lSec, hacked a website owned by the Russian Space Agency – http://uv.ikiweb.ru/.

This appears to be the official website for the World Space Observatory-Ultraviolet (WSO-UV) telescope, also known as the Spektr-UV. It is still down as of 4 March 2022.

 

Anonymous Affiliate v0g3lSec Leaked Russian Space Agency Files!

On 4 March 2022, v0g3lSec released files that were hacked from a private service hosted by the Russian space agency.

The files apparently contained data from Luna – a joint programme between Roscosmos and the European Space Agency (ESA).

  • The leaked data consisted of 261 items, with a size of 729 gigabytes.
  • The executable files (.exe) are from 2012, with a timestamp of 2012-12-20 18:18:57.
  • Most of the documents are from 2009 to 2012, so the files are pretty old.

This suggests that the files that v0g3lSec stole were old data archived by Roscosmos. While it is a technical success, it is unlikely to have any actual effect.

 

Roscosmos Chief Threatens ISS + War

Roscosmos chief, Rogozin, suggested that sanctions against Russia could result in the destruction of the International Space Station (ISS).

If you block cooperation with us, who will save the ISS from an uncontrolled deorbit and fall into the United States or Europe?

Rogozin also said that any cyberattack on Russia’s satellites would be considered casus belli – a cause for war.

However, it is unknown how Roscosmos or Russia plans to declare or effect war against Anonymous, or its affiliates.

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Anonymous Cyberwar Against Russia : 28 February 2022

Here are the latest cyberattacks by the hacktivist group, Anonymous, in their cyberwar against Russia!

 

Anonymous Launches Cyberwar Against Russia!

On 22 February 2022, Anonymous lobbed a warning shot at both Russia and China, hacking an official Chinese website and a Russian Modbus device.

After the Russian invasion started on 24 February, Anonymous announced that they would also begin “gearing up for action” :

#Anonymous has always been against war, and against colonialism. We’ve seen how unfettered power decimates the weak, only having its own self interests in mind. We stand with the people, not the governments of the world.
Anonymous condemns the attacks on the Ukrainian people.

There are many #Anonymous accounts gearing up for action against the imperialist state of Russia, and we will be retweeting their endeavors.

The next day, Anonymous announced that they have started attacking the Russian government.

#Anonymous is currently involved in operations against the Russian Federation. Our operations are targeting the Russian government. There is an inevitability that the private sector will most likely be affected too. While this account cannot claim to speak for the whole (con)

Read more : Anonymous fires Warning Shot at China, Russia over Ukraine!

 

Anonymous Cyberwar Successes Against Russia!

Here is the latest list of cyberattacks that Anonymous successfully conducted in their cyberwar against Russian.

25 February 2022

26 February 2022

  • Anonymous took down several Russian government websites, including the Kremlin, State Duma, and Ministry of Defense.
  • Anonymous “retrieved” and leaked 200 GB of emails from Tetraedr – a Belarusian arms manufacturer, including blueprints of the SAMs (Surface-to-Air Missiles) they manufacture.

27 February 2022

  • Anonymous took down the Chechen Republic government website : chechnya.gov.ru
    Note : This came after multiple reports of Chechen soldiers being deployed to Ukraine.
  • Anonymous shut down gas supply provided by Tvingo Telecom in Russia. Tvingo Telecom is owned by Rostelecom, a Russian state owned telecommunications company.

28 February 2022

  • Anonymous took down several official Belarus government websites :
    – Belarus Ministry of Communications and Information : mpt.gov.by
    – Belarus State Authority for Military Industry : vpk.gov.by
    – Belarus Military : mil.by
  • Anonymous took down several more Russian state and state-linked websites :
    – Pension Fund of the Russian Federation : pfr.gov.ru
    – Russian Public Services portal : gosuslugi.ru
    – Kremlin website (again) : Kremlin.ru
    – Russian Federal Customs Service : customs.gov.ru
    – Russian government website : government.ru
    – Moscow city + mayor website : mos.ru
    – Tass news agency website : Tass.ru
  • The hacking group GNG – an Anonymous affiliate – hacked and leaked a Sberbank database
  • Anonymous Network Battalion 65′ (nB65) hacked and released 40,000 files from the Russian Nuclear Safety Institute.

I will keep updating this article, as and when Anonymous announces their successes against Russia.

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Is This Zelenskyy Before He Became President Of Ukraine?!

Take a look at the viral video of Volodymyr Zelenskyy before he became President of Ukraine, and find out what the facts really are!

 

Claim : This Is Zelenskyy Before He Became President Of Ukraine!

People are sharing a video allegedly of Volodymyr Zelenskyy performing on stage, before he became President of Ukraine.

The video has the overlay “The comedian before he became the Ukrainian president“, and showed him ogling the breasts of several women, while he sang.

 

Truth : This Is Not President Of Ukraine, Volodymyr Zelenskyy!

Ever since Russia invaded Ukraine, social media and WhatsApp groups have been inundated with fake news and videos involving those two countries.

This is yet another example of pro-Russia and anti-Ukraine fake news that people are intentionally / ignorantly sharing, and here are the reasons why…

Fact #1 : He Is Vasyl Humenyuk, Not Volodymyr Zelenskyy

When I first saw the video, I could immediately see that the man was not Volodymyr Zelenskyy.

Identifying the man though took some effort, but I was finally able to identify him as Vasyl Humenyuk (Facebook page).

Fact #2 : Vasyl Humenyuk Is Like Volodymyr Zelenskyy, But Not Him

Vasyl Humenyuk is a Ukrainian comedian and politician like Volodymyr Zelenskyy. In fact, he ran for the Ukrainian Parliamentary elections under the Zelenskyy’s Servant of the People party, but lost.

He was later appointed to head the Yarmolynets District State Administration by Zelenskyy in February 2020.

Except for the fact that they are white males, they don’t really look alike… but just in case, here’s a comparison of the two man.

Fact #3 : It Was A Satirical Comedy Song

Vasyl Humenyuk is a member of the Vinnytsia team in the comedy show, League of Laughter.

The video was a clip of him singing his signature song, “Maiden’s Eyes” in the 2017 League of Laughter.

The song satirises men’s obsession with breasts, calling them “maiden’s eyes” which are what men should really be looking at.

Please watch out for the surge of pro-Russia and anti-Ukraine propaganda like this video.

Help us fight fake news, by sharing this fact check out!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Checks | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Anonymous fires Warning Shot at China, Russia over Ukraine!

The hacktivist group, Anonymous, just fired a warning shot at both China and Russia over the invasion of Ukraine!

 

Anonymous fires Warning Shot at China, Russia over Ukraine!

The hacktivist group, Anonymous, just hacked a Chinese state website, and a logic controller in Russia, as a warning shot to both countries over the invasion of Ukraine.

On Tuesday, 22 February 2022, Anonymous hacked the Chinese Culture website (www.chineseculture.com.cn), replacing its content with a page showing its logo, and the Guy Fawkes mask.

The hacked Chinese Culture website was taken offline, but you can still see the hacked page through the Wayback Machine.

The hacked page includes the YouTube video – It Might Break Your Pinky Heart – the famous music video by Malaysian singer-songwriter, Namewee, that mocks the Chinese government.

Read more : Anonymous Launches Cyberwar Against Russia!

After a video about an old MIT experimental antiviral approach called DRACO (Double-stranded RNA Activated Caspase Oligomerizer), and a reference to Operation Samatha Smith, the hacked page warned Russia over its invasion of Ukraine, with a warning shot in the form of “a small hack”.

However sadly because Putin has burned the bridge and reneged the Minsk deal by prematurely recognising separatist territories as independent, instead of waiting until the conclusion of UN interim administration period and if they vote overwhelmingly for independence per that plan, Anonymous decides to make good some of its threats by conducting a small hack on a Modbus device which we intend as a warning shot.

The above Modbus device isn”t located in countries friendly to the US and Taiwan, nor in neutral countries that want nothing with these. Instead, it is in places like China or somewhere like it.

You can make stupid threats like a spoiled child, but remember that Anonymous never have restrictions that says that only homo sapiens can be part of it.

Sony learnt the hard way in 2011 that a part of Anonymous can finish what a totally different part had started!

The Modbus device was later confirmed to be a Schneider Electric Modicon M251 logic controller located in Russia.

 

Anonymous Will Formally Attack Russia Over Ukraine Invasion!

According to Taiwan News, which reached out to Anonymous, their representative said that they were previously “playing nice and not give them an excuse to start a war“, but now that missiles had been fired on Ukraine, “we are taking off the gloves altogether.

That representative also said, “Anonymous will formally attack Russian websites or devices later” in retaliation for Russia’s invasion of Ukraine.

The Anonymous threat on the Chinese Culture website ended with its signature quote in English, Russian and Chinese :

We are Anonymous
We are legion
We do not forgive
We do not forget
Expect us!
Мы анонимы
Мы легион
Мы не прощаем
мы не забываем
Ждите нас!
我们是匿名者
我们是军团
我们不原谅
我们不会忘记
期待我们

Anonymous did not explicitly say why they are targeting China over Russia’s invasion of Ukraine, but it seems obvious that they believe that China is partly responsible for Russia’s military action.

Perhaps they felt that indirect support by the Chinese, as well as their propaganda effort, gave Russia some leeway and economic support in attacking Ukraine.

Read more : Chinese Media Accidentally Leaks Ukraine Censorship Order!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Watch Out For Nestle 2022 Anniversary Phishing Scam!

Please watch out for the Nestle 2022 Anniversary phishing scam!

Find out why it is just a SCAM, and WARN your family and friends!

 

Nestle 2022 Anniversary Phishing Scam Alert!

People are now sharing the Nestle 2022 Anniversary message on WhatsApp (translated into English) :

CONGRATULATIONS!

Your family has been chosen to receive a lucky drag for the Nestle 2022 Anniversary at the Nestle office.

This contest has been approved by the Malaysian court / police, with the cooperation of Bank Negera Malaysia (BNM).

The link attached to the a website with the following instructions :

  1. Winners must keep the PIN-CEK number as evidence for winner verification and prize collection
  2. There are two ways to submit the contest form – through WhatsApp or this website.
  3. The contest form must be completed with your details. Incomplete forms will be rejected by the sponsor without notice.
  4. Every valid application will be shortlisted. There is no limit to the number of applications.
  5. First Prize Winner : RM10,500
    Second Prize Winner : RM9,300
    Third Prize Winner : RM8,500
  6. To redeem your prize, just use your WhatsApp to :
    a) Fill in the Nestle winner application number
    b) Fill in your full name and identity card number
    c) Attach a clear picture of your BANK ATM CARD – front and back
    d) Go to the nearest ATM machine, and WhatsApp the details above to +60124181128

 

Nestle 2022 Anniversary Phishing Scam : How Does It Work?

The Nestle 2022 Anniversary phishing scam is DANGEROUS. Please warn your family and friends to AVOID it.

Fact #1 : There Is No Such Nestle Giveaway!

There is no such anniversary giveaway by Nestle Malaysia. There is no reason for Nestle Malaysia to give out so much money.

They are a business, not a charity. They are in the business of selling you products, not giving you money.

Businesses do sponsor giveaway contests, but they are generally low value. Nestle Malaysia, for example, is currently giving away RM30 Shopee vouchers.

Fact #2 : Nestle Would Not Use Free Websites

Nestle is a large multinational company. It would not be using free website services like Wix.

Nestle Malaysia has its own website (https://www.nestle.com.my/) and Facebook page (https://www.facebook.com/Nestle.Malaysia) where they post official contests and promotions.

Always verify if a contest is genuine by visiting the official website / social media page.

Fact #3 : Nestle Would Never Ask For Pictures Of Your ATM Card!

Nestle, and any legitimate brand, would NEVER ask you to send them pictures of your bank ATM card!

Sending the pictures of your ATM card will allow them to clone the card, or trick bank staff into giving the scammers access to your bank account.

NEVER EVER SEND ANYONE PICTURES OF YOUR BANK ATM CARD!

Fact #4 : Nestle Would Never Ask You To Go To An ATM

No legitimate contest would require you to go to an ATM machine to receive money.

NEVER TRUST ANYONE WHO ASKS YOU TO GO TO AN ATM MACHINE.

Fact #5 : Nestle Would Never Ask For Your PIN / TAC

Nestle would never ask you for your ATM card’s PIN or any TAC number you may receive.

Giving out those details is how scammers get access to your bank account.

NEVER GIVE OUT YOUR PIN OR TAC NUMBER!

Fact #6 : This Lets Scammers Withdraw Money From Your Bank Account

I know many of us are in dire straits during this COVID-19 pandemic, having lost jobs, income or even loved ones.

Unfortunately, scammers are counting on our desperation to prey on us, using such anniversary scams.

This particular Nestle 2022 Anniversary Scam is a real danger, because it will allow scammers to gain access to your bank account and withdraw money.

Also watch out for the other anniversary scams that I have covered over the years :

Please WARN your family and friends about these scams!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | Business | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Can Hackers Use Good Morning Greetings To Hack You?

Can hackers use Good Morning videos, pictures and messages to hack your devices, and steal your data?

Find out what is happening, and what the FACTS really are!

 

Claim : Hackers Are Using Good Morning Messages To Hack You!

This post about Chinese hackers using Good Morning videos, pictures and messages to hack your devices, keeps going viral on social media and WhatsApp.

It’s a long message, so just skip to the next section for the facts!

Dear friends, please delete all welcome photos and videos in Good Morning format and the like. Read below the article to the end, which will be clear why I ask about it. From now on I will only send personally prepared greetings.

Read it all !!! Send this message urgently to as many friends as you can to stop the invasion.

Olga Nikolaevna Lawyer: Caution:

ATTENTION

For those who like to send Good Morning pictures! Good day! Good evening!

Do not send these “good” messages.

Today, Shanghai China International News sent SOS to all subscribers (this is the third reminder) that experts recommend: please do not send good morning, good night, pictures and videos,.

 

Truth : Good Morning Greetings Not Being Used To Hack You!

Many of us get spammed with Good Morning or Good Night messages every day from family and friends.

While they often clog up Facebook, Telegram and WhatsApp groups, they really do NOT allow hackers to hack your devices.

Here are the reasons why Good Morning messages are very irritating, but harmless…

Fact #1 : Shanghai China International News Does Not Exist

The news organisation that was claimed to be the source of this warning – Shanghai China International News –  does not exist!

Fact #2 : Good Morning Greetings Not Created By Hackers

Hackers (from China or anywhere else) have better things to do than to create these Good Morning pictures and videos.

They are mostly created by websites and social media influencers for people to share and attract new followers.

Fact #3 : No Fraud Involving Good Morning Messages

There has been no known fraud involving Good Morning or even Good Night messages, videos or pictures.

Certainly, half a million victims of such a scam would have made front page news. Yet there is not a single report on even one case…. because it never happened.

Fact #4 : Image-Based Malware Is Possible, But…

Digital steganography is a method by which secret messages and other data can be hidden in digital files, like a photo or a video, or even a music file.

It is also possible to embed malicious code within a Good Morning photo, but it won’t be a full-fledged malware that can execute by itself.

At most, it can be used to hide the malware payload from antivirus scanners, which is pretty clever to be honest…

Fact #5 : Image-Based Malware Requires User Action

In January 2019, cybercriminals created an online advertisement with a script that appears innocuous and would pass any malware check.

However, the image itself has an “almost white” rectangle that is recognised by the script, triggering it to redirect the user to the cybercriminals’ website.

Once there, the victim is tricked into installing a Trojan disguised as an Adobe Flash Player update.

Such a clever way to bypass malware checks, but even so, this image-based malware requires user action.

You cannot get infected by the Trojan if you practice good “Internet hygiene” by not downloading or installing anything from unknown websites.

Fact #6 : Malicious Code Executes Immediately

If you accidentally download and trigger malware, it will execute immediately. It won’t wait, as the hoax message claims.

Deleting Good Morning or Good Night photos or videos will free up storage space in your phone, but it won’t prevent any malware from executing.

There is really no reason for malware to wait before it infects your devices. Waiting will only increase the risk of detection.

Whether the malware serves to take over your device, steal your information or encrypt it for ransom, it pays to do it at the first opportunity.

Now that you know the facts, please SHARE this article with your family and friends!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | SoftwareTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Was Facebook Taken Down By 13 Year-Old Chinese Hacker?

Was Facebook taken down by a 13 year-old Chinese hacker?

Take a look at the viral claim, and find out what the FACTS really are!

 

Claim : Facebook Was Taken Down By 13 Year-Old Chinese Hacker!

On 4 October 2021, Facebook and ALL of its messaging and social media platforms went down for about six hours, including Messenger, WhatsApp and Instagram!

Several websites, as well as people on Twitter and Facebook started claiming that Facebook was taken down by a 13 year-old Chinese hacker called Sun Jisu / Sun Ji Su / Sun Jiso / Sun Ji Soo.

There are quite a number of these claims, so just SKIP to the next section for the facts!

International media claimed that “China” was behind the suspension of social media services in the world.

According to Reuters, a Chinese hacker named “Sun Jisu” is responsible for stopping the services of “Facebook”, “WhatsApp” and Instagram, and added that the Chinese hackers are only 13 years old.

The Chinese hacker “Sun Ji Su” has topped the famous search engines and Twitter platforms during the past minutes, after disabling WhatsApp, Instagram and Facebook today 2021 in all countries of the world, amid questions among activists about the details of this information.

 

Truth : Facebook Was Not Taken Down By 13 Year-Old Chinese Hacker!

The story of a 13 year-old Chinese hacker taking down Facebook is just fake news created by fake news / clickbait websites to go viral and get money through ads.

Here are the reasons why…

Fact #1 : International Media Did Not Blame China

On one blamed China for the bizarre 6-hour downtime of Facebook, WhatsApp, Instagram and Messenger.

The international media referred to cybersecurity specialists who pointed at DNS failure as the most likely cause, not a state actor like China.

Clickbait / fake news websites intentionally added that false claim to “trigger” Chinese netizens and Sinophiles to share their fake news.

Read more : US Refused WHO Investigation Of Fort Detrick For COVID-19?

Fact #2 : Reuters  + NYT Did Not Report On Any Chinese Hacker

Reuters did not report that a 13 year-old Chinese hacker called Sun Jisu was responsible for the bringing down Facebook, WhatsApp, Instagram and Messenger.

Neither did the New York Times write about a 13 year old hacker attacking Facebook.

These are complete lies that are easily verified with a quick check on the Reuters and New York Times websites.

Fact #3 : 13 Year-Old Sun Jisu / Sun Jiso Does Not Exist

There is no 13 year-old Chinese hacker called Sun Jisu / Sun Ji Su / Sun Ji So / Sun Ji Soo. He does NOT exist.

In addition, that is a Korean name, not Chinese – a mistake that a non-Asian person would make.

Fact #4 : That Was An Old Picture Of Wang Zhengyang

The fake news websites used a picture of Chinese hacking prodigy, Wang Zhengyang, speaking at the 2014 Chinese Internet Security Conference.

Wang Zhengyang was 13 year-old at that time, and would be 20 years old this year – 2021. Here are two more pictures of him speaking at that event.

Wang Zhengyang at 2014 Chinese Internet Security Conference

Fact #5 : Facebook Services Were Brought Down By Configuration Changes

Facebook services were not brought down by a hacker, but configuration changes their own engineering team initiated internally.

Facebook’s Vice-President of Infrastructure, Santosh Janardhan, confirmed that “configuration changes” on their “backbone routers” caused the 6-hour long failure.

Our engineering teams have learned that configuration changes on the backbone routers that coordinate network traffic between our data centers caused issues that interrupted this communication. This disruption to network traffic had a cascading effect on the way our data centers communicate, bringing our services to a halt.

Read more : Why Facebook, Messenger, WhatsApp, Instagram Went Down!

Fact #6 : Access Problems Were Caused By Same Servers

Facebook run their internal systems through the same servers, so they became inaccessible when those servers were taken offline.

This included security systems that controlled the fob door locks, with a New York Times reporter tweeting that Facebook staff were unable to gain access to an unspecified office using their keycards.

However, many Facebook staff are working from home due to COVID-19 precautions, so this was only a big problem for engineers trying to gain access to the Facebook data centre in Santa Clara, California.

At no time was this security issue caused by a hacker. It was due to the same servers that went offline.

Read more : Why Facebook, Messenger, WhatsApp, Instagram Went Down!

Now that you know the truth, please SHARE this fact check with your family and friends!

Also, please STOP SHARING fake stories created by fake news / clickbait websites!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | Business | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Verified : KKM + MySejahtera SMS Messages Are Legit!

Are scammers sending fake SMS messages from KKM and MySejahtera to scam you out of your money?

Take a look at the viral post, and find out what the FACTS really are!

 

Claim : KKM + MySejahtera SMS Messages Are Fake!

People have been sharing a screenshot of two SMS messages from KKM (Malaysia Ministry of Health) and MySejahtera, claiming that they are scam messages.

RM0 MySejahtera: You are COVID-19 positive. Kindly refresh your MySejahtera Profile and click to declare your close contact: https://bit.ly/3jNvOqL

RM0 KKM Anda adlh COVID19 positif & masih belum menjawab status kesihatan hari ini. Segera lengkapkan H.A.T. di MySejahtera. Rujuk https://bit.ly/2VMaWrC

This is a scam. If receive don’t click. Please inform all ur family members and friends ….NETIZEN WATCHDOG

Many also include a link to the Kuan Evening Edition video to prove that these messages are indeed fake messages used by scammers in “phishing attacks”.

 

Truth : KKM + MySejahtera SMS Messages Are Legit!

The SMS messages in the screenshot are legit, and came from KKM and MySejahtera.

The truth is that viral message is FAKE NEWS, and here are the facts…

Fact #1 : The MySejahtera SMS Message Is Legitimate

The MySejahtera SMS message in English is legitimate. It warns you that you have tested positive for COVID-19.

You are therefore required to declare your close contacts in the MySejahtera app or website.

The link – https://bit.ly/3jNvOqL – leads to the Close Contact reporting page in the MySejahtera website (https://mysejahtera.malaysia.gov.my/help/closecontact/).

Fact #2 : The KKM Telephone Number Is Genuine

On 24 September 2021, KKM confirmed that the 03-2703-3000 telephone number is genuine.

The Malaysia Ministry of Health uses that telephone number to call those identified as COVID-19 positive to fill up their Home Assessment Tool (HAT) in the MySejahtera app.

Fact #3 : The KKM SMS Message Is Legitimate

The KKM SMS message in Bahasa Malaysia is also legitimate.

It is a reminder that you did not fill in your Home Assessment Tool (HAT) in the MySejahtera app today.

Those who are under home quarantine must complete that home assessment test every day.

The Ministry of Health may issue a compound if you fail to perform the home assessment test, as required.

The link in the SMS – https://bit.ly/2VMaWrC – actually leads to a PDF infographic on the Home Assessment Tool (HAT) – https://www.infosihat.gov.my/images/media_sihat/poster/pdf/DiManakahHAT.pdf

The infographic explains who needs to perform self-monitoring using the HAT feature, and how to do it in the MySejahtera app.

Now that you know the truth, please SHARE this fact check, so your family and friends won’t be fooled by the fake news!

It is critical that everyone understands that these alerts are genuine, and take them seriously!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Jaya Grocer 20th Anniversary Scam Alert!

Please watch out for the Jaya Grocer 20th Anniversary survey scam!

Find out why it is just a SCAM, and WARN your family and friends!

 

Jaya Grocer 20th Anniversary Survey Scam Alert!

People are now sharing these Jaya Grocer 20th Anniversary messages on WhatsApp :

Jaya Grocer 20th Anniversary!

Click to enter to participate in the survey, have a chance to win $1000!

Jaya Grocer 20th Anniversary!

Through the questionnaire, you will have a chance to get 2000 Ringgit .

 

Jaya Grocer 20th Anniversary Survey : Why This Is A Scam

Unfortunately, this is yet another survey scam, like the FamilyMart 70th Anniversary scam!

For one thing – Jaya Grocer was established in 2007, with its first outlet in Jaya 33 in Petaling Jaya 2007.

So they would only be celebrating their 20th anniversary in 2027!

Jaya Grocer also confirmed that this survey is a scam.

I know many of us are in dire straits during this COVID-19 pandemic, having lost jobs, income or even loved ones.

Unfortunately, scammers are counting on our desperation to prey on us, using the same survey scam they have been using for years :

Now, let me show you how to spot these scams next time!

If you spot any of these warning signs, DO NOT PROCEED and DO NOT SHARE!

Warning Sign #1 : Bad Grammar

Most of these scammers do not have a good command of the English language, so if you spot bad grammar, stay away.

Proper contests or events sponsored by major brands like Jaya Grocer will have a PR or marketing person who will vet the text before allowing it to be posted.

Warning Sign #2 : Offering You Free Money Or Gifts

Please do NOT be naive. No one is going to give you money or free gifts just to participate in a survey!

Jaya Grocer isn’t going to give you FREE money, just because it’s their anniversary.

They are a corporation whose business is to make money, not a charity to give you free money.

Warning Sign #3 : Not Using The Real Jaya Grocer Domain

A genuine Jaya Grocer campaign would use their real domain – www.jayagrocer.com.

Or they would run it off the official Jaya Grocer page on Facebook – www.facebook.com/jayagrocer/.

If you see nonsensical domains like uglyarticle.club, ldxqw.bar, etc. that’s a sign of a SCAM!

Warning Sign #4 : Asking You To Forward The Offer

No brand will insist that you must share the offer with 5 groups or 20 friends on WhatsApp.

Do not click to forward their offer to your family and friends. They will not appreciate being scammed with your help!

Warning Sign #5 : Asking You To Download + Register An App

If you click through and joined the fake survey scam, you will eventually be asked to download and register for an app.

That is VERY DANGEROUS. Never agree to download and register for any unknown app from a website.

Always download your apps from an official App Store like Google Play Store (for Android smartphones) and Apple App Store (for iPhones).

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > CybersecurityBusiness | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Did Giant Tsunami Waves Hit Second Penang Bridge?

Did giant tsunami waves hit the second Penang bridge – the Sultan Abdul Muadzam Shah Bridge?

Find out what the facts really are!

Updated @ 2021-08-22 : Updated parts of the article, and the fact check video.

Originally posted @ 2020-12-02

 

Claim : Giant Tsunami Waves Hit Second Penang Bridge!

A video claiming to show the Second Penang Bridge getting hit by giant tsunami waves, is going viral on social media… again!

Giant tsunami waves hit Penang 2nd bridge at 6.00pm yesterday!

Dramatically, a person appeared to be swept away by a giant wave, and a motorcyclist quickly fled another giant wave!

Here is my video fact check video of two examples I found so far…

 

Truth : Tsunami Waves Did NOT Hit Second Penang Bridge!

This is yet another example of fake news spreading like COVID-19 on social media.

The video is genuine, but it does NOT show giant tsunami waves hitting the Second Penang Bridge.

Fact #1 : This Bridge Is Too Small To Be Second Penang Bridge

In the main span, the Second Penang Bridge has a height clearance of 30 metres for ships to pass under. The bulk of the bridge has a much lower 6 metre clearance.

The Second Penang Bridge is also very wide – between 150 and 250 metres, with 4 car lanes and 2 motorcycle lanes.

The bridge in the video appears to be much shorter, with a 4 metre clearance; and much narrower with just 2 lanes.

Fact #2 : No Report Of Any Tsunami Affecting Penang

There have been no earthquakes nearby, or reports of any tsunami affecting Penang.

The waves appear to be approximately 12-15 metres high, and would have been big news. Yet there is no mention of it in the mainstream media. Very sus, no?

Fact #3 : It Was An Old Video

This video went viral earlier in July 2020, when it was posted as evidence of a tsunami hitting a bridge in Alaska after an earthquake there. However, that was false as well.

The earliest we could find was a December 2017 tweet by a CNBC-AWAAZ anchor, Deepali Rana, who claimed that it was a video of the Bandra-Worli Sea Link. That was also false!

Fact #4 : The Video Was Recorded On Minicoy Island

The video was recorded on 23 August 2017, showing giant waves hitting the Eastern Jetty at Minicoy Island (Maliku), in Lakshadweep, India.

It is a much smaller structure than the second Penang bridge, or the Bandar-Worli Sea Link bridge.

Here is a picture of the Eastern Embarkation Jetty, with a surfer for size comparison.

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | TravelTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Scam Alert : COVID-19 Relief Fund By Federal Government!

Please watch out for the COVID-19 Relief Fund by Federal Government scam!

Find out why it is just a SCAM, and WARN your family and friends!

 

Scam Alert : COVID-19 Relief Fund By Federal Government!

People are now sharing this COVID-19 RELIEF FUND message on WhatsApp :

Apply For The Covid-19 Relief Fund Provided By The Federal Government. Hurry Up, It takes few seconds to apply. Dont [sic] miss this opportunity.

Apply Here

Note : I added the Scam Alert overlay to prevent it from being further abused.

 

COVID-19 Relief Fund : Why This Is A Scam

I know many of us are in dire straits during this COVID-19 pandemic, having lost jobs, income or even loved ones. Unfortunately, scammers are counting on our desperation to prey on us.

I will now show you why this COVID-19 Relief Fund message is just another scam. Please warn your family and friends!

Fact #1 : No Global Relief Fund By Any Federal Government

When a scam tells you that “the federal government” is giving away money, you should always ask yourself – WHICH federal government???

No government in the world is giving away money to anyone across the world. Not even the three richest economies in the world – US, China and the EU – have a COVID-19 relief fund to give money away like that.

Fact #2 : The Three Questions Are A Red Herring

Most of these scams employ simple but useless questions to trick you into thinking that this is genuine. Look at the three questions this scam is asking :

  • What’s your age range?
  • How much money do you want to receive?
  • What’s your employment status?

In a real government relief programme, your eligibility status will be based on some official document – your identity card, driver’s licence, passport, etc.

No one is going to give you money simply because you answer a few questions. And NO ONE is ever going to ask you how much you want to receive!

Fact #3 : No Government Will Ask You To Invite Friends / Groups

A real government relief programme will NEVER ask you to invite friends and groups on WhatsApp, much less insist that you invite 15 friends or 5 groups before they give you money.

That’s a dead giveaway that this is a scam, and the scammers want you to help them scam other people. So NEVER invite your friends to join the scam.

Fact #4 : SNF Global Relief Initiative Is Not By Any Federal Government

To make the scam look legit, the scammers used the SNF Global Relief Initiative for the COVID-19 Pandemic graphics.

That initiative is not by any government, but by the Stavros Niarchos Foundation (SNF).

And just in case you are wondering, no, the SNF does not give away money to individuals. They only make grants to non-profit organisations and collaborative funds.

Fact #5 : The Domain Is New + Protected

If you check the domain “relief-fund.live“, you will see that it was only created on 24 March 2021.

Even more suspiciously, all contact and ownership details have been REDACTED FOR PRIVACY. That’s often a sign that the owners are worried about being sued or prosecuted.

Name: relief-fund.live
Registry Domain ID: ac787c4c5c19460696fa1bf46d133faa-DONUTS

Nameservers:
dns1.registrar-servers.com
dns2.registrar-servers.com

Registry Expiration: 2022-03-24 11:41:35 UTC
Updated: 2021-03-29 11:42:31 UTC
Created: 2021-03-24 11:41:35 UTC

Name: REDACTED FOR PRIVACY
Organization: Privacy service provided by Withheld for Privacy ehf
Email: Please query the RDDS service of the Registrar of Record identified in this output for information on how to contact the Registrant, Admin, or Tech contact of the queried domain name.
Tel: REDACTED FOR PRIVACY
Fax: REDACTED FOR PRIVACY
Mailing Address: REDACTED FOR PRIVACY Capital Region REDACTED FOR PRIVACY IS

Fact #6 : The Comments Are Completely Faked

You may notice a bunch of comments at the bottom of the scam website. They are only there to trick you into thinking that other people received the money.

Try refreshing them. They will never change, unlike a real live comment stream. The time codes will not change either.

Try clicking on the Like option. Nothing will happen. Your Like will not register.

That’s because this is a fake comment stream. It’s all hardcoded and fixed.

Now that you know that this is just another scam, please warn your family and friends.

And please remember – no one gives away money like that. Don’t fall for these scams!

 

Help Support My Work!

If you would like to support my work, you can do so via bank transfer /  PayPal / credit card.

Name : Adrian Wong

Credit Card / Paypal : https://paypal.me/techarp
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)

Thank you in advanced! ❤️

 

Recommended Reading

Go Back To > Fact Checks | Tech ARP

 

Support Tech ARP!

If you like our work, please support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Thank you!

Is There A Communist Revolution Monument In Penang?

Pictures of a Chinese Communist Revolution Monument in Penang have gone viral, with calls from netizens to TEAR IT DOWN!

Find out what’s going on, and what the facts really are!

 

Claim : DAP Created A Communist Monument In Penang!

Pictures of a Chinese Communist Revolution Monument in Penang are being shared on Facebook and social media, with messages like this (translated into English) :

DAP created a Communist monument in Penang after they took power.

Communist monument on Flag Hill in Penang.

What are you waiting for? When are you going to tear it down?

Do You Know?

In Penang, there is a World War II memorial called the Revolution Memorial.

But it’s full of Chinese letters and the figures are all dressed as Communists.

There is absolutely no information in English or Bahasa Melayu, much less Tamil.

When people say it’s racist, [you get] angry

This monument was built as soon as DAP took over Penang from Gerakan.

Here is a selection of comments that were posted with that misleading picture, showing how it instigates hate and racial tensions :

Roboh kan semuanya,, pulau Pinang ialah tanah Melayu,,jgn lupa tu,, DAP memang haprak

Demolish it all. Penang is Malay soil. Don’t forget that. DAP is useless.

Say no to komunis DAP

Puak2 pengkhianat DAP..musoh melayu..musoh islam..

DAP are traitors, enemies of the Malays, enemies of Islam.

Robohkan Tugu peringatan pembunuh anak anak peribumi Melayu. kenapa di iarkan sebegitu rupa di mana anguta dan bekas angguta keselamatan kita boleh biarkan sebegitu rupa…Letupkan !

Destroy the memorial of the killers of Malay natives. Why is it being left like that? How can our security forces let this be? Blow it up!

 

Communist Revolution Monument In Penang : The Truth

The short version is this – the monument in the pictures exists, but it is neither a Communist monument, nor was it created or built by DAP.

All of the claims about it in the incendiary posts above are FALSE.

We would like to warn everyone to be careful of political fake news being shared to incite hatred and racial tensions.

Fact #1 : That Is The Penang Overseas Chinese Anti-War Memorial

The monument in the picture is the Penang Overseas Chinese Anti-War Memorial Park, also known as the Air Itam War Memorial Park.

It is NOT a Chinese Communist Revolution Monument.

There are two key monuments at this memorial park :

  • a bronze-coloured army supply truck being pushed by three men – memorialising the Nanyang transport volunteers from Malaya, who helped deliver supplies to China when they were blocked by the Japanese.
  • a 45-foot tall white obelisk that commemorates the Marco Polo Incident, that kicked off the Second Sino-Japanese War of 1937-1945.

The ashes of some 800 incomplete skeletons of Penang Chinese residents who died under Japanese occupation, and the Nanyang transport volunteers who died, are also buried under the obelisk.

The truck also has a number plate with the date 1939 on it. Communist China didn’t exist in 1939, so claims that this is a Communist monument is… idiotic.

Fact #2 : It Was Built In 1946 And Opened In 1951

Construction on the Penang Overseas Chinese Anti-War Memorial Park started in 1946, and it was officially opened in 1951.

DAP was only formed on 11 October 1965, so the claim that it was built when DAP gained power in Penang is false.

Because the People’s Republic of China was only established in 1949, the claim that this is a communist revolution monument is idiotic.

It is also extremely stupid to claim that the figures were dressed as Chinese Communists, because Communist China didn’t exist when the monument was being built!

Fact #3 : It Was Privately Funded

The original Penang Overseas Chinese Anti-War Memorial Park was funded entirely by the Penang China Relief Fund, a Penang-based private fundraising organisation.

It was officially opened at 11 AM on 11 November 1951 by Penang Chinese tycoon and philanthropist, Lim Lean Teng, who was the supervisory chairman of the organisation.

After the Penang China Relief Fund was dissolved in 1952, the Kong Min School was entrusted to maintain the memorial with an annual budget of $5,000, and an annual memorial service.

Fact #4 : It Was Upgraded For Its 60th Anniversary

The Board of Trustees of the Kong Min School decided to repair and upgrade the memorial to coincide with its 60th anniversary.

The RM 400,000 project also added a 60 foot-long wall relief showing Malayan transport volunteers on the Burma-China road, and a peace column with flying doves.

On top of private donations by various organisations and individuals, the Penang state government also chipped in.

When it was opened at precisely 11:11 AM on 11 November 2016 by Penang Chief Minister, Lim Guan Eng, politicians from both sides of the political divide attended the launch.

Therefore, the claim that no one knew about it, or that it was only something DAP would do, is categorically FALSE.

Photo Credit : The Sun Daily

Fact #5 : There Is Information In FOUR Languages

The memorial park has information in four languages – English, Bahasa Melayu, Chinese and Japanese.

Here is the information panel in English and Bahasa Melayu, proving that the claim there is no information in both languages are FALSE.

 

Help Support My Work!

If you would like to support my work, you can do so via bank transfer /  PayPal / credit card.

Name : Adrian Wong

Credit Card / Paypal : https://paypal.me/techarp
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)

Thank you in advanced! ❤️

 

Recommended Reading

Go Back To > Fact CheckHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Was Pragya Mishra Killed Over COVID-19 Comments?

Was Indian journalist, Pragya Mishra, murdered in broad daylight after criticising the Kumbh Mela festival for causing the catastrophic COVID-19 surge?

Find out what the viral video of her murder showed, and what the FACTS really are!

 

Claim : Pragya Mishra Killed In Broad Daylight Over COVID-19 Comments!

Two videos and a photo are going viral on WhatsApp, claiming that Indian journalist Pragya Mishra was killed in broad daylight after she criticised the recent Kumbh Mela festival in India for causing the catastrophic surge in COVID-19.

The first video showed the news segment in which Pragya Mishra talked about the Kumbh Mela and the COVID-19 tsunami.

The second video was CCTV footage showing a woman getting stabbed by a man in broad daylight.

The videos are accompanied by one or two pictures showing the woman lying in a pool of blood, with one of these messages :

An Indian broadcaster who spoke against unhealthy Hindu gatherings and the spread of Corona disease was assassinated publicly.

Pragya mishra murdered in broad daylight

Because she was talking in news about kumbh mela in the era of cornavirus

 

No! Pragya Mishra Was NOT Killed Over COVID-19 Comments!

This is yet another COVID-19 related hoax. Pragya Mishra is alive and well.

It has been suggested that the fake news was created as a kind of warning to Pragya Mishra –  watch what you are saying about Hindus and the Kumbh Mela, or else…

That is something we cannot prove, but here are the facts that we can prove…

Fact #1 : Pragya Mishra Is Alive And Well

These videos and photos first circulated on or just before 18 April 2021.

At that time, Pragya Mishra was at home because of “COVID-19 protocols”. When she was informed about the videos and photos, she tweeted that she was safe.

As of 30 April 2021, she’s still active on her Twitter account, @PragyaLive.

Fact #2 : Second Video Was Of A Real Murder

Unfortunately, the second video is genuine, and shows the murder of a real woman on 10 April 2021.

It was not Pragya Mishra, but a 26 year-old lady called Neelu Mehta, who worked at the Safdarjung Hospital in Delhi.

She was stabbed and murdered in broad daylight by her husband, Harish Mehta, an employee of the Marriage Bureau.

Allegedly, he suspected his newly-wed wife of eight months of infidelity, and stabbed her to death. Even after she died, he continued stabbing her.

Sadly, no one intervened or tried to help her.

 

Help Support My Work!

If you would like to support my work, you can do so via bank transfer /  PayPal / credit card.

Name : Adrian Wong

Credit Card / Paypal : https://paypal.me/techarp
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)

Thank you in advanced! ❤️

 

Recommended Reading

Go Back To > Fact ChecksHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Scam Alert : CIMB Customers Hit By Fake SMS Messages!

Scammers continue to target CIMB customers, using many different kinds of fake SMS messages.

Do NOT click or call if you receive any of these fake SMS messages!

And please warn your family and friends!

 

Scam Alert : CIMB Customers Hit By Fake SMS Messages!

Whether you are a CIMB Bank customer or not, you may receive one of these alarming SMS messages :

RM 0.00 CIMB: Confidential!

Dear CIMB users, your account will TERMINATED on 24/12/20. Verify via http://www.cimbclickikm.cc to keep on using CIMB Clicks services.

Please make verification within 24hours to avoid service interruption.

RM0 CIMB: Instant Transfer RM4998.78 to CHAY LEE FEN/HONG LEONG on 23-Dec-2020, 13:06:35. Call the no. at the back of your card for queries.

If you receive any of these SMS messages, please DO NOT click on the link, or call the number. JUST IGNORE THEM, or delete them.

RM0.00 CIMB: MYR 2968.00 was charged on your card num 4204 at Shopee.MY. If this is not your txn, call 1800-9767 now.

Cimb Your account is judged as high risk by the system, PLS re-verify your account. cimbclicksecurity.com

Note : These scams do not just affect CIMB Bank. In fact, all banks are affected :

 

Why These CIMB SMS Messages Are Fake

Let us show you how to identify these fake CIMB SMS messages.

If you spot any of these warning signs, BACK OFF and DO NOT PROCEED!

Warning Sign #1 : Grammatical Mistakes

If you carefully read the first SMS messages above, you can easily spot numerous grammatical mistakes. A bank will never send such poorly worded messages to their customers.

However, they may copy the real SMS message from CIMB to trick you into thinking that this is a real transaction. Such fake SMS messages will have proper grammar.

Warning Sign #2 : Embedded Links

Banks will NEVER embed links (URLs) into the message. If you see embedded links, always think – SCAM SMS!

Unlike the Public Bank SMS scam, they used a copy of the real SMS message to trick you into clicking the URL in the first message.

Warning Sign #3 : Wrong Links

And always check the link – www.cimbclickikm.cc and cimbclicksecurity.com are not the correct addresses for the CIMB Bank websites (www.cimbclicks.com.my or www.cimb.com.my).

The best policy is to manually key in the bank website address. NEVER click on any link in an SMS, even if it looks legit.

When you see any website with .cc links, be wary because the .CC domains are registered in the Cocos (Keeling) Islands – an Australian territory of only 14 km², with only about 600 inhabitants.

Warning Sign #4 : No Personal Login Phrase / Picture

To avoid phishing attacks, banks now give you a secret response (like a picture or a phrase) to confirm that you are visiting their legitimate website.

If the website you are visiting gives you the wrong picture or secret phrase, you have been tricked into visiting a fake website designed to mimic the real bank website.

You should also remember that the bank website must show you secret picture or phrase right after you enter your login, but BEFORE you key in your password.

If you are asked to key in your password without the website displaying the secret phrase or picture, you have been tricked into visiting a fake website designed to mimic the real bank website.

 

CIMB Advice To Protect Against Fake SMS / Email Scams

Here is a list of DOs and DON’Ts to protect yourself against fake SMS / email scams.

Please DO follow these good practices

  1. Pay attention to your transaction alerts and check your account activities regularly. In case of any unusual activity, please contact us immediately.
  2. If you wish to contact us, ONLY call the number on the back of your card or refer to CIMB website “Contact Us” page.
  3. Always check the URL of the website that you are making purchases from. Ensure  the “lock” icon or “https” appears on the website’s address bar.
  4. Always find a reputable seller on online marketplaces by searching for reviews from other customers to know their experience.
  5. To access CIMB Clicks, type the entire URL as follows: www.cimbclicks.com.my
  6. Always remember to log out once you have completed your banking transactions.

Please DO NOT follow these bad practices

  1. Don’t panic and give personal information to fraudsters impersonating representatives of government agencies etc. even if they deploy fear tactics. Immediately call the number on the back of your card to verify with CIMB.
  2. Never apply for personal financing through unverified links or individuals promising a lower rate. CIMB does not impose any application charges for personal financing applications.
  3. Never take instructions from anyone to change the mobile number in CIMB records to any number other than your own mobile number.
  4. When transacting online, never continue with a purchase if you have any doubts if the seller is not genuine.
  5. Never share details such as your card number / User ID / PIN / password / TAC  with anyone or key them in in any website other than CIMB Clicks.
    (Note: CIMB will never ask for  your ‘User ID’, ‘Password’ or ‘TAC’ under any circumstances outside of CIMB Clicks).
  6. Do not click on links or open email attachments from unknown / unreliable senders / sources.
    (Note: Emails from CIMB will always end with @cimb.com such as cimb.marketing@cimb.com

 

Recommended Reading

Go Back To > Cybersecurity | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Scam Warning : Public Bank Customers Hit By Fake SMS!

Scammers continue to target Public Bank customers, using many different kinds of fake SMS messages.

Do NOT click or call if you receive any of these fake SMS messages!

 

Public Bank : Fake SMS Scam Warning! Do NOT Click / Call!

Whether you are a Public Bank customer or not, you may receive one of these alarming SMS messages.

Please DO NOT click on the link, or call the number. JUST IGNORE THEM, or delete them.

The safest thing to do is NEVER CLICK ON A LINK in any SMS. If you need to log into your bank account, key in the website address manually.

RM0 PBB/PIBB: Your PBB account will TERMINATED on 02Dec20 01:30:00 AM. Please make verification via http://www.mypbebank.cc to avoid service interruption. Verify now keep on using PBB services.

RM0 Credit Cash out RM3,000 form card ending no 7102 successful on 01 DEC. Information system sending. Call PBB 1800-81-9566 for any query

Warning: Your account is marked as insecure, please click Return PAC immediately to confirm that it is safe to use. (https://pbevip.vip/)

PBe Your account is in a high-risk state PLS log in immediately and return the PAC to protect your account security https://www.pbebanks.top

PBe Warning: Phishing URLs are frequent recently, PLS log in immediately to strengthen account security. 2Mar21 13:14 https://se1.pbevip.top/

PB e Your account is in a high-risk by the system, PLS re-verify your account https://pbbanks.red/ <security reminder is normal>

RM0 PIBB: Thank you for using your card ending 1098@senQ MYR 2899, Pls call 03-56260232 now, if you didn’t use it

RM0 PBB/PIBB: Trx amt MYR2699.00  @LAZADA for card ending 5738. Call PB 1-800-81-2337 now if didn t perform.

PBB: Your account is judged as high risk by the system. PLS re-verify your account https://www.pbebanks.asia/ <security reminder is normal>

PB e Alarm Your banking Suit now is marked as insecure, PLS re-verify your account https://online-pbebank.com <security reminder is normal>

 

Public Bank Fake SMS Scam : What Happens If You Click?

Clicking on the links will often lead you to a phishing website, a fake website designed to look like a Public Bank website.

You will be asked to key in your personal information, including your Public Bank user name and password. DO NOT KEY IN YOUR INFORMATION!

But if you are free and want to help screw these scammers, key in fake information as many times as possible.

Note : These scams do not just affect Public Bank. In fact, all banks are affected :

 

Public Bank : How To Identify Fake SMS Messages

With a little help from Public Bank, let’s show you how to identify fake SMS messages.

If you spot any of these warning signs, BACK OFF and DO NOT PROCEED!

Warning Sign #1 : Grammatical Mistakes

Read the two SMS messages above, and you can easily spot numerous grammatical mistakes. A bank will never send such poorly worded messages to their customers.

Warning Sign #2 : Embedded Links

Banks will NEVER embed links (URLs) into the message. If you see embedded links, always think – SCAM SMS!

Warning Sign #3 : Wrong Links

And always check the link – www.mypbebank.cc is not the correct address for the Public Bank website (www.pbebank.com)

When you see any website with .cc links, be wary because the .CC domains are registered in the Cocos Islands – an Australian territory of only 14 km², with only about 600 inhabitants.

The same goes for generic, top level domains like .TOP, .VIP, .TOP, .RED.ASIA, etc.

Warning Sign #4 : No Personal Login Phrase / Picture

To avoid phishing attacks, banks now give you a secret response (like a picture or a phrase) to confirm that you are visiting their legitimate website.

If the website you are visiting gives you the wrong picture or secret phrase, you have been tricked into visiting a fake website designed to mimic the real bank website.

You should also remember that the bank website must show you secret picture or phrase right after you enter your login, but BEFORE you key in your password.

If you are asked to key in your password without the website displaying the secret phrase or picture, you have been tricked into visiting a fake website designed to mimic the real bank website.

 

Recommended Reading

Go Back To > Cybersecurity | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

macOS, iOS, iPadOS, Safari CVE-2021-1844 Bug : Fix It Now!

Apple just rushed out macOS Big Sur 11.2.3, iOS 14.4.1, iPadOS 14.4.1 and Safari 14.0.3 to patch a critical security bug.

Find out what they fix, and why you need to update your MacBook, iPhone and iPad right away!

 

Apple Rushes Out macOS, iOS, iPadOS, Safari Critical Bug Fixes!

Released on 8 March 2021, macOS Big Sur 11.2.3 patches only one bug, which may mislead users into thinking that it’s not very important.

WebKit

Available for: macOS Big Sur

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: A memory corruption issue was addressed with improved validation.

CVE-2021-1844: Clément Lecigne of Google’s Threat Analysis Group, Alison Huffman of Microsoft Browser Vulnerability Research

On the same day, Apple also released iOS 14.4.1 and iPadOS 14.4.1 – both patching the same CVE-2021-1844 vulnerability.

WebKit

Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: A memory corruption issue was addressed with improved validation.

CVE-2021-1844: Clément Lecigne of Google’s Threat Analysis Group, Alison Huffman of Microsoft Browser Vulnerability Research

Apple also released Safari 14.0.3, which patches the same vulnerability for macOS Catalina and macOS Mojave :

WebKit

Available for: macOS Catalina and macOS Mojave

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: A memory corruption issue was addressed with improved validation.

CVE-2021-1844: Clément Lecigne of Google’s Threat Analysis Group, Alison Huffman of Microsoft Browser Vulnerability Research

 

Why Install These macOS, iOS, iPadOS, Safari Bug Fixes ASAP?

While they appear to only patch WebKit in macOS Big Sur, iOS, iPadOS and Safari, they are CRITICAL bug fixes that you need to install right away.

They patch the new CVE-2021-1844 vulnerability, which was discovered by Clément Lecigne of Google’s Threat Analysis Group and Alison Huffman of Microsoft Browser Vulnerability Research.

This vulnerability allows a remote attacker to trigger a buffer overflow when the victim opens a specially-crafted web page, allowing the attacker to execute arbitrary code on the target system.

It is not known if this vulnerability has been exploited yet, but it is critical to install the new updates to prevent that from happening.

 

Recommended Reading

Go Back To > Software | CybersecurityHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


CD PROJEKT RED Hack : Source Codes + Docs Stolen!

CD PROJEKT RED just had their source codes and internal documents stolen in a MAJOR HACK, and they may all end up being leaked!

 

CD PROJEKT RED Hack : Source Codes Stolen, Servers Encrypted!

On 9 February 2021, CD PROJEKT RED announced that their data – including source codes and internal documents – were stolen in a hack, and could possibly be leaked.

Their servers were also encrypted in a secondary ransomware attack by the same hackers, but they had backups of the encrypted data.

CD PROJEKT RED publicly ruled out negotiating with the hackers, or giving in to their demands.

This would likely mean that their source codes and internal documents will eventually be released publicly by the hackers.

The only silver lining – CD PROJEKT RED noted that they do not have any evidence that the personal data of their employees were accessed or stolen.

 

CD PROJEKT RED Hack : The Hackers’ Threats

According to the ransom note left on their servers, the hackers stole :

  • FULL source codes for Cyberpunk 2077, Witcher 3, GWENT and the unreleased version of Witcher 3.
  • ALL of their internal documents on accounting, administration, legal, HR, investor relations and more

They also encrypted all of their CD PROJEKT RED’s servers, but acknowledged that they would most likely recover the data from their backups.

The hackers are giving the CD PROJEKT RED team 48 hours to contact them to negotiate.

If there is no agreement, they threaten to sell or leak the source codes, and release their internal documents to the media.

They claim that the internal documents will make CD PROJEKT RED look bad, causing their stock prices to fall and their investors will lose trust in them.

 

CD PROJEKT RED : Official Statement On Hack

This is the official statement by CD PROJEKT RED on the hack :

Yesterday we discovered that we have become a victim of a targeted cyber attack, due to which some of our internal systems have been compromised.

An unidentified actor gained unauthorized access to our internal network, collected certain data belonging to CD PROJEKT capital group, and left a ransom note the content of which we release to the public. Although some devices in our network have been encrypted, our backups remain intact. We have already secured our IT infrastructure and begun restoring the data.

We will not give in to the demands nor negotiate with the factor, being aware that this may eventually lead to the release of the compromised data. We are taking necessary steps to mitigate the consequences of such a release, in particular by approaching any parties that may be affected due to the breach.

We are still investigating the incident, however at this t time we can confirm that – to the best of our knowledge – the compromised systems did not contain any personal data of our players or users of our services.

We have already approached the relevant authorities, including law enforcement and the President of the Personal Data Protection Office, as well as IT forensic specialists, and we will closely cooperate with them in order to fully investigate the incident.

 

Recommended Reading

Go Back To > Cybersecurity | Games | SoftwareHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Why You Should NOT Move WhatsApp Chats To Telegram!

Telegram just highlighted the ability to migrate WhatsApp chats to their app, but you really should NOT do that.

Find out why this is a BIG security and privacy risk than just leaving your chats in WhatsApp!

 

Telegram : Moving Chat History From WhatsApp, Line + KakaoTalk

In a recent version 7.4 update for their iOS app, Telegram announced a new feature – the ability to move your chat messages from other apps like WhatsApp, Line and Kakaotalk to their app.

Curiously, that ability has actually been part of WhatsApp since 2018, when they introduced the ability to export chats to email and other apps.

And while this feature is purportedly available only with the iOS version of Telegram Messenger, you can already do that with existing versions of WhatsApp and Telegram.

 

Why You Should NOT Move WhatsApp Chats To Telegram!

You should note that the privacy risks with WhatsApp have been grossly exaggerated by the media and many Internet “experts”.

For one thing – WhatsApp users have been sharing metadata with Facebook since September 2016, a fact initially lost on many media outlets and “experts”.

But we understand the fear – Facebook is a real snoop. Even so, it would be a mistake to migrate from WhatsApp to Telegram.

Let us share with you why you should NOT migrate from WhatsApp to Telegram, and why it is a BIG mistake to migrate your WhatsApp data to Telegram.

Fact #1 : Telegram Is LESS Secure Than WhatsApp

WhatsApp fully implemented end-to-end encryption across all of their apps and network since 5 April 2016.

End-to-end encryption prevents WhatsApp or Facebook from reading your messages. Only the sender and receiver(s) can read them.

WhatsApp shares a considerable amount of data and metadata that Facebook can use to identify and track your movements and activities. But not the content of your messages.

Telegram, on the other hand, has STILL NOT implemented end-to-end encryption for all messages by default.

Instead, they still insist on offering end-to-end encryption only when you create a Secret Chat.

This leaves the bulk of your messages completely readable by Telegram and anyone who intercepts those messages as they travel from your device through the Internet to the recipient.

The very presence of Secret Chats between certain people is itself metadata that can help oppressive regimes identify their enemies or whistleblowers.

Fact #2 : Your Data Is Stored In Telegram Cloud Servers

All WhatsApp data is stored only in your registered device. WhatsApp also does not retain messages in their servers after they are delivered, and will only store files (like photos and videos) and undelivered messages for 30 days.

It’s the opposite with Telegram – all of your data – messages, photos, videos, documents – is stored in their cloud servers. Even though they are encrypted in storage, Telegram holds the encryption keys, NOT YOU.

This ability has its advantages like convenient access across multiple devices, but it also makes Telegram less secure.

Telegram has access to your encrypted files, including the ability to decrypt them for authorities that legally compels them to do so.

Fact #3 : Moving Your Messages + Media To Telegram Exposes Them

While your chats and media remain within your WhatsApp app, they are encrypted and not available to anyone but yourself (and the recipients).

Migrating your chat messages and media to Telegram would involve sending them unencrypted to Telegram’s servers.

This exposes your hitherto secure chats and media to a man-in-the-middle attack – allowing a third party to snoop or grab a copy of the data as it travels unencrypted to the Telegram servers.

Fact #4 : Facebook Already Has Your Metadata

As we pointed out earlier, WhatsApp has been sharing our metadata with Facebook since September 2016.

So moving your existing chats out of WhatsApp won’t limit or reduce your exposure. That horse has long bolted from the stable.

Moving your chat history and files to Telegram will just offer a new attack surface for cybercriminals and oppressive regimes.

Fact #5 : Facebook Will Still Have Your Data If You Still Use Facebook!

Here is the other thing that people don’t realise – migrating from WhatsApp to another messaging app is pointless if you do not also stop using Facebook.

As long as you still use Facebook, they will still have access to a consideration amount of metadata. Losing your WhatsApp metadata just gives them less metadata.

After all, Facebook can track your movements and activity even if you are NOT on Facebook! This is what they call Off-Facebook Activity.

 

Recommended Reading

Go Back To > Cybersecurity | SoftwareHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Scam Alert : Toyota 80th Anniversary Celebration!

Watch out for the Toyota 80th Anniversary Celebration scam, and the fake giveaway of a Toyota Corolla!

Find out why it is a SCAM, and please alert your family and friends!

 

Scam Alert : Toyota 80th Anniversary Celebration!

This is the link that has gone viral on WhatsApp, claiming to offer you a chance to win a Toyota Corolla during the Toyota 80th Anniversary Celebration!

It’s just a scam, so we added that overlay to prevent it from being further abused.

Please DO NOT CLICK on the link, or proceed with the “contest”.

 

Why Toyota 80th Anniversary Celebration Contest Is A Scam!

For those of you who are wondering – how do you know it’s a scam, here are the facts…

Fact #1 : The Link Is Not Legitimate

If you look at the URL – the link – it goes to http://1s7wttd.nodxteh.cn.

It is obviously not a Toyota-related link, but an unrelated Chinese-registered (.cn) domain.

A real Toyota campaign would use the official Toyota website or Facebook / Twitter page, not a Chinese domain with å weird, random link.

In addition, it is not an SSL-encrypted link, which would start with https://. While not a hallmark of a scam link, legitimate websites will use SSL-encrypted links (with https, not http)

When you see such links, DO NOT CLICK on them.

Fact #2 : Toyota’s 80th Anniversary Was In 2017

Toyota was established on 28 August 1937. They celebrated their 80th anniversary in 2017, and will be 85 years old in 2022.

This is not only a scam, it’s an old scam – it probably started in 2017 and has been refreshed every few months for the last 5 years!

Here was the official 28 August 2017 tweet by the Toyota Motor Corp.

Fact #3 : Toyota Is In The Business Of Selling Cars

Toyota is in the business of SELLING CARS, not giving them away.

Why on Earth would they give away cars to celebrate their 80th anniversary? Think about that.

They are a business, not a charity! They may give you a special discount, or launch a special edition of a Toyota car, but they will NOT give anyone a free car.

Not surprisingly, they did NOT give away a single car when they celebrated their 80th anniversary in 2017!

Fact #4 : The Page Has So Many Troubling Clues

If you click on the link, you will be led to this page, claiming you will get a free gift with Toyota… and a chance to win a Toyota Corolla.

The page is full of grammatical mistakes – something an actual Toyota website would not have.

On top of that, why would Toyota give you a Corolla for answering simple questions like “Do you know Toyota?” Seriously…

And below that is a list of comments by people who claimed to have won the Toyota Corolla. Do you really believe that Toyota is giving away so many cars?

Try clicking on their names, and nothing happens. Nothing happens either if you click to Like. So where are the likes coming from?

They are all FAKE COMMENTS. If you check the code, you can see that both the comments and pictures were manually inserted.

Fact #5 : You Will Always Win The Car

You can try the contest any number of times, and you will ALWAYS win the car.

Why? Because the next step involves you sharing this with 5 groups or 20 friends on WhatsApp!

So no matter how many times you participate, you will ALWAYS win the free Toyota Corolla. Do you think that’s the case with a real contest?

This is a SCAM. DO NOT SHARE and do NOT proceed beyond this page.

Fact #6 : There Are Tons Of Similar Scams

This is not a unique scam, and it pays to understand that this is really a common online scam.

There are tons of similar “anniversary scams”, some of which I debunked earlier :

These “anniversary scams” keep cropping up because they are very lucrative for scammers.

No matter how many times they recycle the same scams, or create new variants, people keep falling for them!

So please SHARE this scam alert, and WARN your family and friends!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | AutomotiveTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

HUAWEI New Year Gift Scam : Don’t Click Or Share!

Watch out for the HUAWEI New Year Gift scam that’s circulating on WhatsApp!

Do NOT click or share. Just delete it, and WARN YOUR FAMILY AND FRIENDS!

 

HUAWEI New Year Gift Scam : Do NOT Click Or Share!

Scammers are sending out this message on WhatsApp, claiming that HUAWEI is giving away New Year gifts.

Please do NOT click on the message, or share it. Just delete it and warn your family and friends!

 

Why This HUAWEI New Year Gift Offer Is A Scam

Let us show you why this HUAWEI New Year Gift offer (and similar offers) is just a scam.

If you spot any of these warning signs, BACK OFF and DO NOT PROCEED!

Warning Sign #1 : Not Using The Real HUAWEI Domain

A genuine HUAWEI campaign would use the real HUAWEI domain – www.huawei.com.

The use of a different domain (2021-whatsapp3w.bar) should warn you that this is not a legitimate HUAWEI website.

Warning Sign #2 : HUAWEI Does Not Give Away Free Gifts

HUAWEI is a for-profit corporation whose goal is to make money, not give it away.

They are not a charity, and will never give free gifts to celebrate a new year, or anniversary.

They only give free gifts to promote the purchase of their latest products.

Warning Sign #3 : Ridiculous Prizes

While brands may sometimes give away branded swag like a face mask, a t-shirt, or a cap; they will NEVER give away CASH as a prize.

And there is no way they would give away US$5,000 cash prizes. That’s just nuts! It should be cheaper to just give away one of their latest Mate 40 Pro smartphones.

 

Recommended Reading

Go Back To > Cybersecurity | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Maybank B40 Subsidy Scam : Do NOT Click Or Call!

Watch out for the new Maybank B40 subsidy scam! It is a phishing attack to gain access to your Maybank account!

Do NOT click or call. Just delete it, and WARN YOUR FAMILY AND FRIENDS!

 

Maybank B40 Subsidy Scam : Do NOT Click Or Call!

Scammers are sending out this SMS claiming that Maybank (MBB) will issue the B40 subsidy after you fill in some information.

Please do NOT click on the message, or call the telephone number. Just delete it and warn your family and friends!

 

Why This Maybank B40 Subsidy Offer Is Just A Scam

Let us show you why this Maybank B40 subsidy offer (and similar offers) is just a scam.

If you spot any of these warning signs, BACK OFF and DO NOT PROCEED!

Warning Sign #1 : No Such B40 Subsidy Program

The Malaysian government has not announced any B40 subsidy program.

Neither would Maybank offer free money for the B40. It’s a bank, not a charity.

Warning Sign #2 : Bad Grammar

The bad English grammar should be a warning sign that this is not a legitimate offer.

Warning Sign #3 : Not Using The Real Maybank Domain

A genuine Maybank campaign would use the real Maybank domain – www.maybank.com.my.

The use of a different domain should warn you that this is not a legitimate Maybank website.

In fact, Google Chrome will warn you that this website is a phishing attack – to get your personal and banking information.

Warning Sign #4 : Asking You For Your Information

The banks – whether they are Maybank, Public Bank, CIMB, etc – will NEVER ask you to fill in your personal details.

Think about it – they already have your information because you have an account with them!

Even if there is a legitimate B40 subsidy programme, they only need you to log into your Maybank account. They do NOT need you to register your details again.

These scammers ask you for these details so they can use them in phishing calls, to convince you that they are really from Maybank.

Warning Sign #5 : Asking You For Your Bank Login!!!

This is a BIG warning sign. Banks will NEVER ask you for your user name and password.

If you key in this information, you are basically giving these scammers access to your Maybank account.

They will call or message you and try to get your TAC (Transaction Authorisation Code) number that is sent to your mobile number. DO NOT GIVE THAT TO THEM!

If you sent them your user name and password, please contact the bank immediately, and change your password!

 

Recommended Reading

Go Back To > Cybersecurity | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Tesco New Year Scam Alert : Do NOT Click / Forward!

Now that the New Year is almost here, the Tesco New Year Scam is going viral on WhatsApp!

Do NOT click on the message if you receive it. Do NOT forward it either!

Just delete it, and WARN YOUR FAMILY AND FRIENDS!

 

Tesco New Year Scam Alert : Do NOT Click / Forward!

People are sharing this Tesco New Year promotion that claims to offer a gift card valued up to RM1000, but it is really nothing more than a SCAM!

Please do NOT click on the message, or forward it to anyone. Just delete it and warn your family and friends!

 

Why This Tesco New Year Offer Is Just A Scam

Let us show you why this Tesco New Year gift card offer (and similar offers) is just a scam.

If you spot any of these warning signs, BACK OFF and DO NOT PROCEED!

Warning Sign #1 : Bad Grammar

Most of these Tesco gift card scams have bad grammar (example #1, example #2), which is a big clue that this isn’t a genuine Tesco offer.

In this example, they capitalised TESCO and use the grammatically incorrect “win up to RM1000 Tesco Gift Card!

Warning Sign #2 : Offering You Free Money Or Gifts

Please do NOT be naive. Nothing is FREE in this world, much less a RM1000 gift card.

Tesco isn’t going to give you FREE money, just because it’s the new year, or their anniversary.

They are a corporation whose business is to make money, not a charity to give you free money.

Warning Sign #3 : Not Using The Real Tesco Domain

A genuine Tesco Malaysia campaign would use the real Tesco Malaysia domain – www.tesco.com.my.

Or they would run it off the official Tesco Malaysia page on Facebook – www.facebook.com/TescoMY.

This scam is using a BlogSpot.com domain – which is not something any genuine company would do.

Warning Sign #4 : Asking You To Forward The Offer

No brand will insist that you must share the offer with 5 groups or 20 friends on WhatsApp.

Do not click to forward their offer to your family and friends. They will not appreciate being scammed with your help!

Warning Sign #5 : Asking You To Download + Register An App

If you click through and joined the fake survey scam, you will eventually be asked to download and register for an app.

That is VERY DANGEROUS. Never agree to download and register for any unknown app from a website.

Always download your apps from an official App Store like Google Play Store (for Android smartphones) and Apple App Store (for iPhones).

 

Recommended Reading

Go Back To > Cybersecurity | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Antivaxxers Keep Creating Fake Tiffany Dover Death Claims!

Antivaxxers are still creating and spreading fake death claims about Tiffany Dover, while hounding her family and her!

Find out what’s going on, and what YOU can do to help Tiffany Dover and her family!

 

Tiffany Dover : Who Is She? What’s Going On?

Here’s a quick primer for those who have not heard of Tiffany Dover, or what has energised anti-vaccination groups recently.

On 17 December 2020, Tiffany Dover fainted on live TV after getting her Pfizer-BioNTech COVID-19 vaccine, due to vasovagal syncope – a very common condition.

She recovered within minutes, and explained that it wasn’t a surprise because she often faints when she feels pain.

However, antivaxxers pounced on the incident as evidence that the Pfizer BNT162b2 vaccine is dangerous, sharing edited versions of the video to sow fear, doubt and uncertainty about the vaccine.

 

Antivaxxers Keep Creating Fake Tiffany Dover Death Claims!

After her fainting episode was explained and the full video was shared, antivaxxers had to switch gears.

They decided to claim that Tiffany Dover later DIED, after recovering from her fainting spell.

Here are three examples…

Joe Leonard

It looks like rumors of Tiffany Dover’s death are TRUE and it is being covered up.

No activity since her highly publicized public vaccination despite regular use of Instagram. No replies to dozens of questions. Family set their profiles to private.

RIP

Kitty Lynn

OMFG! FAINTING NURSE DIED
Tiffany Dover IS DEAD

I saw that fainting nurse died, so I checked it out!
This death record has to be her! Same town, age, and most importantly, the family listed all show up as her friends on fb!

Shannon Haas

BREAKING There is reports Tiffany Dover is dead. She is the nurse who collapsed on live television when being interviewed about the vaccine. We can’t confirm it, we are trying to collect as much intel as possible.
INTEL WE KNOW
– She is from Tennessee
– She collapsed 15+ minutes after taking the Pfizer vaccine on live television
– Her Instagram account is tiffany_dover_ and she hasn’t posted for 5 days, she generally posts every 2-3 days
– There is social media posts about her death from people who were allegedly connected to her or her family
– There is reports of death threats against her family for sharing the info
– There is reports of censorship
– The debunkers are saying it is all false but are providing very little evidence

Someone even created a fake Tiffany Dover memorial page on Instagram (now removed), saying :

She will always be remembered for her bravery. She was a wonderful nurse. #nurse #bravery #covid_19 #tiffanydover #inmemoryof #hospital #alwaysremember

It gained 1650 followers before Instagram finally shut it down. While it was up, antivaxxers used it to promote the claim that she truly did die after being vaccinated with the Pfizer-BioNTech COVID-19 vaccine.

 

How To Help Tiffany Dover With These Fake Death Claims

Creating and sharing fake death claims about Tiffany Dover isn’t about “having an open mind” or “just investigating the truth” or “exploring the possibilities“.

This is literally cyberbullying!

And it doesn’t even stop with fake death claims. People are also hounding her family and friends, calling them fake or crisis actors.

Help stop this cyberbullying of Tiffany Dover, her family and her friends, by :

  • sharing such fact check articles, including this and this.
  • telling the truth to those who shared with you those fake claims
  • sharing the fact check links as comments on those fake social media posts
  • DO NOT SHARE those fake social media posts

 

Why Tiffany Dover Death Claims Are ALL FAKE!

Fact #1 : Tiffany Dover Is Alive And Well!

According to the NewsChannel 9 ABC crew who recorded the whole event on 17 December 2020, Tiffany Dover quickly recovered, and within minutes, was able to get up and speak with them again.

While antivaxxers are claiming that she subsequently died, those are complete lies. She did NOT die.

Her hospital – CHI Memorial – posted this tweet two days later, confirming that she is well, asking that people give her and her family privacy.

Fact #2 : Tiffany Dover Alive And Well On Video, 4 Days Later!

On 21 December 2020, CHI Memorial followed up with a short video showing that she is alive and well, surrounded by her colleagues.

To prove that it was not filmed before her vaccination and alleged “death”, they held up banners that said, “Nursing Leadership Vaccinated Together, #CHIMemorialStrong” and the date “12-21-20“.

Fact #3 : People Found The Wrong Death Record

Conspiracy theorists and antivaxxers are parading online search results showing her death record.

Many searched Tiffany Dover in the wrong state, because they thought she was a nurse in Alabama. Is it any wonder she got the wrong death record?

Some even assumed that SearchQuarry lists only dead people. It’s actually a search engine for public records in the United States.

With such amazing keyboard investigators, who needs the FBI?

Fact #4 : Tiffany Dover Is Not A Unique Name

As unique as Tiffany Dover surely is as a person, her name isn’t unique.

In the entire US, there are currently 47 Tiffany Dovers, with nine of them in Tennessee. And no, they are NOT CLONES, as some people are alleging.

And they do not include Tiffany Dovers who have actually passed away years or even decades ago.

Fact #5 : People Are Not Obligated To Be Active On Social Media

Skeptics like Shannon Haas claim that she must be dead because “she hasn’t posted for 5 days” even though “she generally posts every 2-3 days“.

First of all, NO ONE is obligated to post anything on social media, much less maintain their activity level.

Secondly, a lack of updates does NOT mean she is dead. Some of us actually have lives, like a real social life outside of social media?

Let’s not forget that she’s a nurse manager in CHI Memorial, which is not only actively treating COVID-19 patients, they are also working to administer the Pfizer COVID-19 vaccine.

So is it really that surprising if she has been too busy to update your stalkers with her latest selfies?

But since you are so “concerned” about her well-being, here’s a photo of Tiffany Dover with her CHI Memorial colleagues on 21 December 2020 :

Fact #6 : Claims Of Reports Are Just Claims, Not Actual Evidence

People like Shannon Haas, Joe Leonard and Kitty Lynn are not true skeptics. They are just too damn lazy to go beyond making unverified claims on social media.

He claimed that there are “reports of death threats against her family for sharing the info” and “reports of censorship“.

But when a friend asked for links for those reports, he could only reply, “Not sure.” I kid you not.

Yet, he had no qualms claiming too that “debunkers are saying it is all false but are providing very little evidence“.

If you see claims like that, WITHOUT EVIDENCE, please treat it the same way you would if someone told you he/she can fly without wings.

With the utmost skepticism : Yeah, sure, bro… sure… preferably with a middle finger.

 

Recommended Reading

Go Back To > Fact Checks | ScienceHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Did Alabama Nurse, Tiffany Dover, Die From Pfizer Vaccine?

Antivaxxers are claiming that an Alabama nurse, Tiffany Dover, died on live TV after taking the Pfizer-BioNTech COVID-19 vaccine!

Find out what’s going on, and what the facts really are!

Updated @ 2020-12-25 : Added more fact checks, because antivaxxers continue to post fake claims about Tiffany. It’s Christmas, for crying out loud!

Originally posted @ 2020-12-23

 

Did Alabama Nurse, Tiffany Dover, Die From Pfizer Vaccine?

There are several versions of this story, but they basically boil down to two main storylines :

a) an unnamed Alabama nurse died on live TV after taking the Pfizer-BioNTech COVID-19 vaccine!

⭕️🦅COVID 19 -TEST🦅⭕️ A nurse in Alabama dies directly on the air after taking the Pfizer vaccine for Corona 💥 This is clear evidence of the danger of the vaccine, including the toxins and animal genes .. ⭕️👆👆👆LOOK AT VEDIO CLIP!

b) a Tennessee nurse, Tiffany Dover, died after fainting on live TV (after taking the Pfizer-BioNTech COVID-19 vaccine)

OMFG! FAINTING NURSE DIED
Tiffany Dover IS DEAD

I saw that fainting nurse died, so I checked it out!
This death record has to be her! Same town, age, and most importantly, the family listed all show up as her friends on fb!

So the nurse who took the COVID-19 vaccination on live television is now dead days after being vaccinated..

 

No, Tiffany Dover, Did NOT Die From Pfizer Vaccine!

The short and sweet summary is this – no nurse died after taking the Pfizer vaccine, whether on live TV or otherwise.

For the skeptics who are fond of asking, “How do you know? Were you there?”, here are the facts…

Fact #1 : No Nurse Died On Live TV In Alabama

Despite claims that an unnamed nurse died in Alabama after being injected with the Pfizer COVID-19 vaccine, that is not true.

The claim was shared with the video of Tiffany Dover, a nurse in Tennessee, fainting on live TV after receiving her Pfizer vaccination.

It is likely that antivaxxers intentionally switched the location from Tennessee to Alabama, to mislead those who already knew about Tiffany Dover.

Fact #2 : Tiffany Dover Is Alive And Well!

According to the NewsChannel 9 ABC crew who recorded the whole event on 17 December 2020, Tiffany Dover quickly recovered, and within minutes, was able to get up and speak with them again.

While antivaxxers are claiming that she subsequently died, those are complete lies. She did NOT die.

In fact, her hospital – CHI Memorial – posted this tweet, confirming that she is well, asking that people give her and her family privacy.

Fact #3 : Tiffany Dover Alive And Well On Video, 4 Days Later!

On 21 December 2020, CHI Memorial followed up with a short video showing that she is alive and well, surrounded by her colleagues.

To prove that it was not filmed before her vaccination and alleged “death”, they held up banners that said, “Nursing Leadership Vaccinated Together, #CHIMemorialStrong” and the date “12-21-20“.

Fact #3 : People Found The Wrong Death Record

Conspiracy theorists and antivaxxers are parading online search results showing her death record.

In fact, Kitty Lynn in this example searched for Tiffany Dover in the wrong state – Alabama. Is it any wonder she got the wrong death record?

Note : We intentionally added the HOAX overlay, to prevent it from being misleadingly shared

And this intrepid online investigator discovered that he/she was also listed on searchquarry.com.

Funnily enough, herdsheeple thought that SearchQuarry lists only dead people. It’s actually a search engine for public records in the United States.

With fantastic investigators like herdsheeple and Kitty Lynn, who needs the FBI?

Fact #4 : Tiffany Dover Is Not A Unique Name

As unique as Tiffany Dover surely is as a person, her name isn’t unique.

In the entire US, there are currently 47 Tiffany Dovers, with nine of them in Tennessee. And no, they are NOT CLONES, as some people are alleging.

And they do not include Tiffany Dovers who have actually passed away years or even decades ago.

Fact #5 : No Animal Genes In mRNA Vaccines

Some of these messages include the claim that the Pfizer COVID-19 vaccine contains animal genes, that’s completely false.

There are no genes of any sort in mRNA vaccines, whether they are from Pfizer or Moderna.

The mRNA in these COVID-19 vaccines are merely RNA instructions – coding for the SARS-CoV-2 spike proteins. That’s it.

Recommended : Pfizer + Moderna mRNA Vaccines : How Do They Work?

 

Recommended Reading

Go Back To > Fact Checks | ScienceHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!