Tag Archives: Cyber threats

Petronas 50th Anniversary Scam Alert!

Please watch out for the Petronas 50th Anniversary survey contest scam!

Find out why it is just a SCAM, and WARN your family and friends!

 

Petronas 50th Anniversary Survey Scam Alert!

People are now sharing the Petronas 50th Anniversary messages on WhatsApp :

Petronas 50th Anniversary!

Click to enter to participate in the survey, have a chance to win 2000 Ringgit!

 

Petronas 50th Anniversary Survey : Why This Is A Scam

Unfortunately, this is yet another survey scam, like the FamilyMart 70th Anniversary scam!

For one thing – Petronas was incorporated on 17 August 1974, so their 50th anniversary would be on 17 August 2024!

Petronas confirmed that this survey is a scam in a Facebook post :

PETRONAS has been made aware of a scam online “survey” conducted supposedly in conjunction with “PETRONAS’ 50th Anniversary”.

We wish to inform that neither PETRONAS nor any of our subsidiaries within the Group of Companies are involved in this “survey”, and we appeal to the public not to respond or take part.

I know many of us are in dire straits during this COVID-19 pandemic, having lost jobs, income or even loved ones.

Unfortunately, scammers are counting on our desperation to prey on us, using the same survey scam they have been using for years :

Now, let me show you how to spot these scams next time!

If you spot any of these warning signs, DO NOT PROCEED and DO NOT SHARE!

Warning Sign #1 : Bad Grammar

Most of these scammers do not have a good command of the English language, so if you spot bad grammar, stay away.

Proper contests or events sponsored by major brands like Petronas will have at least one PR or marketing person who will vet the text before allowing it to be posted.

Warning Sign #2 : Offering You Free Money Or Gifts

Please do NOT be naive. No one is going to give you money or free gifts just to participate in a survey!

Petronas isn’t going to give you FREE money, just because it’s their anniversary.

They are a corporation whose business is to make money, not a charity to give you free money.

Warning Sign #3 : Not Using The Real Jaya Grocer Domain

A genuine Petronas campaign would use their real domain – www.petronas.com.

Or they would run it off the official Petronas page on Facebook – www.facebook.com/petronas/.

If you see nonsensical domains like 0yjjg61.cn, 1eaf1rnbeef.top, ldxqw.bar, etc. that’s a sign of a SCAM!

Warning Sign #4 : Asking You To Forward The Offer

No brand will insist that you must share the offer with 5 groups or 20 friends on WhatsApp.

Do not click to forward their offer to your family and friends. They will not appreciate being scammed with your help!

Warning Sign #5 : Asking You To Download + Register An App

If you click through and joined the fake survey scam, you will eventually be asked to download and register for an app.

This is VERY DANGEROUS. Never agree to download and register for any unknown app from a website.

Always download your apps from an official App Store like Google Play Store (for Android smartphones) and Apple App Store (for iPhones).

Please help us fight scams like this and SHARE this article out!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > CybersecurityBusiness | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Are These Shanghai Disneyland Robot Dancers Real?!

Did China create these amazing robot dancers at the Shanghai Disneyland, beating even the Japanese?

Watch the viral clip for yourself, and find out what the FACTS really are!

 

Claim : China Created Classic Robot Dancers At Shanghai Disneyland!

Here is the video that countless people have been sharing on social media and even on YouTube. It is often paired with a short explanation in (broken) English.

This classic dance is only created in China and broadcast in Shanghai Disneyland. They are not female dance artists, but all robots made in China.

The performance time is only about 5 minutes, but the ticket queue time takes 4 hours. The ticket price is 499 yuan.

It has surpassed Japan in complexity, and its perfect facial expressions. Send this video to everyone to watch. Let us enjoy together…

 

Truth : They Are NOT Robot Dancers At Shanghai Disneyland!

The agility and grace of these dancers are amazing, but they are NOT robot dancers created by China for Shanghai Disneyland!

The less gullible would point out that it is something you would only expect from professional human dancers, and they would be right.

Fact #1 : That Is A Video Of A CBDF Competition

That was actually a video clip from one of the many competitions organised and broadcast by the CBDF (Chinese Ballroom Dance Federation).

Although we cannot ascertain who the dancers are, you can see the CBDF logo in the background, at 4:03 and 4:38.

No robot made today can match their agility and grace.

Fact #2 : 499 Yuan Was The Entry Price To Shanghai Disneyland

The fake story claimed that the ticket to watch this performance costs 499 Yuan – about US$73 / £55 / RM303. That would be ridiculously exorbitant for a single show.

In truth, that was the cost of an entry ticket to the Shanghai Disneyland when it first opened in February 2016.

Since 6 June 2018, it has been priced at 399 Yuan (off-peak), 575 Yuan (peak) and 665 Yuan (peak holiday).

Fact #3 : Disneyland Does Not Charge Extra To Watch Certain Shows

Anyone who has been to Disneyland knows that the entry fee is pricey. That’s because it covers all rides and shows inside Disneyland.

You only need to pay for food and drinks, and arcade games. Or if you opt to purchase Disney Fastpasses (Fastpass, FastPass+, MaxPass) to bypass long queues at popular rides or shows.

Otherwise, all rides and shows are free to enjoy once you enter Disneyland.

Fact #4 : That Is Not The Only Fake Video Of Chinese Robot Dancers

That is not the only fake video of Chinese robot dancers.

This one circulated earlier, claiming to be of a female robot dancer that handily beats all Japanese made-robots.

In that example, they took the video clip from the 2018 World Dance Sport Federation Championship in Lithuania…

Recommended : Did China Create This Amazing Female Dancing Robot?

 

Who Would Create Fake Stories About Robot Dancers?

With China’s aggressive foreign stance in recent years, it is not uncommon to see such fake stories being created and shared.

Some believe it’s part of a concerted attempt to burnish China’s image overseas.

Others believe the many fake stories are being created to drown out the negative coverage of China’s controversial Belt and Road Initiative, and their aggressive moves in the South China Sea.

Whatever the reasons may be, it is our duty as global citizens to stop the proliferation of such fake stories.

Please share this fact check with your friends, so they know the truth!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | Photo + VideoTech ARP

 

Support Tech ARP!

If you like our work, please support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Thank you!

Anonymous Affiliates Are Attacking Russian Space Agency!

After Anonymous declare a cyberwar against Russia, their affiliates are going after the Russian space agency, Roscosmos.

Here is what they accomplished so far!

 

Anonymous Affiliate NB65 Attacked Russian Space Agency!

On 28 February 2022, the hacking group – Anonymous Network Battalion 65′ (NB65), which hacked and released over 40,000 files from the Russian Nuclear Safety Institute.

They then turned their attention to the Russian Space Agency, claiming to shut down the WS02 Vehicle Monitoring System server at the Roscosmos Control Center on 1 March 2022.

The Russian Space Agency sure does love their satellite imaging.

Better yet they sure do love their Vehicle Monitoring System.

The WS02 was deleted, credentials were rotated and the server is shut down.

Network Battalion isn’t going to give you the IP, that would be too easy, now wouldn’t it?

Have a nice Monday fixing your spying tech. Glory to Ukraine.

We wont [sic] stop until you stop dropping bombs, killing civilians and trying to invade.

Go the fuck back to Russia.

However, Roscosmos Chief Executive, Dmitry Rogozin denied the claim, saying that “The information of these scammers and petty swindlers is not true. All our space activity control centers are operating normally.

 

Anonymous Affiliate v0g3lSec Hacked Russian Space Agency Website!

On 3 March 2022, another Anonymous affiliate, v0g3lSec, hacked a website owned by the Russian Space Agency – http://uv.ikiweb.ru/.

This appears to be the official website for the World Space Observatory-Ultraviolet (WSO-UV) telescope, also known as the Spektr-UV. It is still down as of 4 March 2022.

 

Anonymous Affiliate v0g3lSec Leaked Russian Space Agency Files!

On 4 March 2022, v0g3lSec released files that were hacked from a private service hosted by the Russian space agency.

The files apparently contained data from Luna – a joint programme between Roscosmos and the European Space Agency (ESA).

  • The leaked data consisted of 261 items, with a size of 729 gigabytes.
  • The executable files (.exe) are from 2012, with a timestamp of 2012-12-20 18:18:57.
  • Most of the documents are from 2009 to 2012, so the files are pretty old.

This suggests that the files that v0g3lSec stole were old data archived by Roscosmos. While it is a technical success, it is unlikely to have any actual effect.

 

Roscosmos Chief Threatens ISS + War

Roscosmos chief, Rogozin, suggested that sanctions against Russia could result in the destruction of the International Space Station (ISS).

If you block cooperation with us, who will save the ISS from an uncontrolled deorbit and fall into the United States or Europe?

Rogozin also said that any cyberattack on Russia’s satellites would be considered casus belli – a cause for war.

However, it is unknown how Roscosmos or Russia plans to declare or effect war against Anonymous, or its affiliates.

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Is This Zelenskyy Before He Became President Of Ukraine?!

Take a look at the viral video of Volodymyr Zelenskyy before he became President of Ukraine, and find out what the facts really are!

 

Claim : This Is Zelenskyy Before He Became President Of Ukraine!

People are sharing a video allegedly of Volodymyr Zelenskyy performing on stage, before he became President of Ukraine.

The video has the overlay “The comedian before he became the Ukrainian president“, and showed him ogling the breasts of several women, while he sang.

 

Truth : This Is Not President Of Ukraine, Volodymyr Zelenskyy!

Ever since Russia invaded Ukraine, social media and WhatsApp groups have been inundated with fake news and videos involving those two countries.

This is yet another example of pro-Russia and anti-Ukraine fake news that people are intentionally / ignorantly sharing, and here are the reasons why…

Fact #1 : He Is Vasyl Humenyuk, Not Volodymyr Zelenskyy

When I first saw the video, I could immediately see that the man was not Volodymyr Zelenskyy.

Identifying the man though took some effort, but I was finally able to identify him as Vasyl Humenyuk (Facebook page).

Fact #2 : Vasyl Humenyuk Is Like Volodymyr Zelenskyy, But Not Him

Vasyl Humenyuk is a Ukrainian comedian and politician like Volodymyr Zelenskyy. In fact, he ran for the Ukrainian Parliamentary elections under the Zelenskyy’s Servant of the People party, but lost.

He was later appointed to head the Yarmolynets District State Administration by Zelenskyy in February 2020.

Except for the fact that they are white males, they don’t really look alike… but just in case, here’s a comparison of the two man.

Fact #3 : It Was A Satirical Comedy Song

Vasyl Humenyuk is a member of the Vinnytsia team in the comedy show, League of Laughter.

The video was a clip of him singing his signature song, “Maiden’s Eyes” in the 2017 League of Laughter.

The song satirises men’s obsession with breasts, calling them “maiden’s eyes” which are what men should really be looking at.

Please watch out for the surge of pro-Russia and anti-Ukraine propaganda like this video.

Help us fight fake news, by sharing this fact check out!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Checks | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Anonymous fires Warning Shot at China, Russia over Ukraine!

The hacktivist group, Anonymous, just fired a warning shot at both China and Russia over the invasion of Ukraine!

 

Anonymous fires Warning Shot at China, Russia over Ukraine!

The hacktivist group, Anonymous, just hacked a Chinese state website, and a logic controller in Russia, as a warning shot to both countries over the invasion of Ukraine.

On Tuesday, 22 February 2022, Anonymous hacked the Chinese Culture website (www.chineseculture.com.cn), replacing its content with a page showing its logo, and the Guy Fawkes mask.

The hacked Chinese Culture website was taken offline, but you can still see the hacked page through the Wayback Machine.

The hacked page includes the YouTube video – It Might Break Your Pinky Heart – the famous music video by Malaysian singer-songwriter, Namewee, that mocks the Chinese government.

Read more : Anonymous Launches Cyberwar Against Russia!

After a video about an old MIT experimental antiviral approach called DRACO (Double-stranded RNA Activated Caspase Oligomerizer), and a reference to Operation Samatha Smith, the hacked page warned Russia over its invasion of Ukraine, with a warning shot in the form of “a small hack”.

However sadly because Putin has burned the bridge and reneged the Minsk deal by prematurely recognising separatist territories as independent, instead of waiting until the conclusion of UN interim administration period and if they vote overwhelmingly for independence per that plan, Anonymous decides to make good some of its threats by conducting a small hack on a Modbus device which we intend as a warning shot.

The above Modbus device isn”t located in countries friendly to the US and Taiwan, nor in neutral countries that want nothing with these. Instead, it is in places like China or somewhere like it.

You can make stupid threats like a spoiled child, but remember that Anonymous never have restrictions that says that only homo sapiens can be part of it.

Sony learnt the hard way in 2011 that a part of Anonymous can finish what a totally different part had started!

The Modbus device was later confirmed to be a Schneider Electric Modicon M251 logic controller located in Russia.

 

Anonymous Will Formally Attack Russia Over Ukraine Invasion!

According to Taiwan News, which reached out to Anonymous, their representative said that they were previously “playing nice and not give them an excuse to start a war“, but now that missiles had been fired on Ukraine, “we are taking off the gloves altogether.

That representative also said, “Anonymous will formally attack Russian websites or devices later” in retaliation for Russia’s invasion of Ukraine.

The Anonymous threat on the Chinese Culture website ended with its signature quote in English, Russian and Chinese :

We are Anonymous
We are legion
We do not forgive
We do not forget
Expect us!
Мы анонимы
Мы легион
Мы не прощаем
мы не забываем
Ждите нас!
我们是匿名者
我们是军团
我们不原谅
我们不会忘记
期待我们

Anonymous did not explicitly say why they are targeting China over Russia’s invasion of Ukraine, but it seems obvious that they believe that China is partly responsible for Russia’s military action.

Perhaps they felt that indirect support by the Chinese, as well as their propaganda effort, gave Russia some leeway and economic support in attacking Ukraine.

Read more : Chinese Media Accidentally Leaks Ukraine Censorship Order!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Watch Out For Nestle 2022 Anniversary Phishing Scam!

Please watch out for the Nestle 2022 Anniversary phishing scam!

Find out why it is just a SCAM, and WARN your family and friends!

 

Nestle 2022 Anniversary Phishing Scam Alert!

People are now sharing the Nestle 2022 Anniversary message on WhatsApp (translated into English) :

CONGRATULATIONS!

Your family has been chosen to receive a lucky drag for the Nestle 2022 Anniversary at the Nestle office.

This contest has been approved by the Malaysian court / police, with the cooperation of Bank Negera Malaysia (BNM).

The link attached to the a website with the following instructions :

  1. Winners must keep the PIN-CEK number as evidence for winner verification and prize collection
  2. There are two ways to submit the contest form – through WhatsApp or this website.
  3. The contest form must be completed with your details. Incomplete forms will be rejected by the sponsor without notice.
  4. Every valid application will be shortlisted. There is no limit to the number of applications.
  5. First Prize Winner : RM10,500
    Second Prize Winner : RM9,300
    Third Prize Winner : RM8,500
  6. To redeem your prize, just use your WhatsApp to :
    a) Fill in the Nestle winner application number
    b) Fill in your full name and identity card number
    c) Attach a clear picture of your BANK ATM CARD – front and back
    d) Go to the nearest ATM machine, and WhatsApp the details above to +60124181128

 

Nestle 2022 Anniversary Phishing Scam : How Does It Work?

The Nestle 2022 Anniversary phishing scam is DANGEROUS. Please warn your family and friends to AVOID it.

Fact #1 : There Is No Such Nestle Giveaway!

There is no such anniversary giveaway by Nestle Malaysia. There is no reason for Nestle Malaysia to give out so much money.

They are a business, not a charity. They are in the business of selling you products, not giving you money.

Businesses do sponsor giveaway contests, but they are generally low value. Nestle Malaysia, for example, is currently giving away RM30 Shopee vouchers.

Fact #2 : Nestle Would Not Use Free Websites

Nestle is a large multinational company. It would not be using free website services like Wix.

Nestle Malaysia has its own website (https://www.nestle.com.my/) and Facebook page (https://www.facebook.com/Nestle.Malaysia) where they post official contests and promotions.

Always verify if a contest is genuine by visiting the official website / social media page.

Fact #3 : Nestle Would Never Ask For Pictures Of Your ATM Card!

Nestle, and any legitimate brand, would NEVER ask you to send them pictures of your bank ATM card!

Sending the pictures of your ATM card will allow them to clone the card, or trick bank staff into giving the scammers access to your bank account.

NEVER EVER SEND ANYONE PICTURES OF YOUR BANK ATM CARD!

Fact #4 : Nestle Would Never Ask You To Go To An ATM

No legitimate contest would require you to go to an ATM machine to receive money.

NEVER TRUST ANYONE WHO ASKS YOU TO GO TO AN ATM MACHINE.

Fact #5 : Nestle Would Never Ask For Your PIN / TAC

Nestle would never ask you for your ATM card’s PIN or any TAC number you may receive.

Giving out those details is how scammers get access to your bank account.

NEVER GIVE OUT YOUR PIN OR TAC NUMBER!

Fact #6 : This Lets Scammers Withdraw Money From Your Bank Account

I know many of us are in dire straits during this COVID-19 pandemic, having lost jobs, income or even loved ones.

Unfortunately, scammers are counting on our desperation to prey on us, using such anniversary scams.

This particular Nestle 2022 Anniversary Scam is a real danger, because it will allow scammers to gain access to your bank account and withdraw money.

Also watch out for the other anniversary scams that I have covered over the years :

Please WARN your family and friends about these scams!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | Business | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Did China Create This Amazing Female Dancing Robot?

Did China create this amazing female dancing robot for a dance show in Shanghai?

Watch the viral video for yourself, and find out what the FACTS really are!

 

Did China Create This Amazing Dancing Robot?

Here is the video that countless people have been sharing on social media and even on YouTube. It is often paired with a short explanation in (broken) English.

Can u believe that this female dancer is robot ? The dance was held in Shanghai n it lasted only 5 minutes but the queue was 4hrs n cost 499 Yuan!

It has surpassed Japan in complexity, and saw its perfect facial expressions. Send this video to everyone to watch, let us enjoy together…

 

The Truth About This Amazing Female Dancing Robot

The agility and grace of this female dancing robot, and its facial expressions, are incredible.

The less gullible would point out that it is something you would only expect from a real human being, and they would be right.

Fact #1 : That Is A WDSF Competition Video

That was actually a video clip from the 2018 World Dance Sport Federation Championship in Lithuania.

The initials WDSF (World Dance Sport Federation) can be seen, together with the recording date at the upper left corner of the video.

Fact #2 : The Dance Only Lasted A Minute

The dance in the video only lasted just over a minute, even though the accompanying fake message claimed it lasted for 5 minutes.

Fact #3 : They Are Lithuanian Dance Champions

Both dancers are very human. In fact, they are Lithuanian dance champions Ieva Zukauskaite (female), and Evaldas Sodeika (male).

Fact #4 : 499 Yuan Was Old Entry Price To Shanghai Disneyland

The fake story claimed that the ticket to watch this performance costs 499 Yuan – about US$73 / £55 / RM303. That would be ridiculously exorbitant for a short dance.

In truth, that price was “copied” from the two earlier hoaxes (here and here) about robot dancers at the Shanghai Disneyland.

Even that price was not accurate, because 499 Yuan was the cost of an entry ticket to the Shanghai Disneyland when it first opened in February 2016.

Since 6 June 2018, it has been priced at 399 Yuan (off-peak), 575 Yuan (peak) and 665 Yuan (peak holiday).

 

Why Would Someone Create This Fake Dancing Robot Story?

With China’s aggressive foreign stance in recent years, it is not uncommon to see such fake stories being created and shared.

Some believe it’s part of a concerted attempt to burnish China’s image overseas.

Others believe the many fake stories are being created to drown out the negative coverage of China’s controversial Belt and Road Initiative, and their aggressive moves in the South China Sea.

Whatever the reasons may be, it is our duty as global citizens to stop the proliferation of such fake stories.

Please share this fact check with your friends, so they know the truth!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | Photo + VideoTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

MySJ Trace : Should You Enable Or Disable?

Should you enable the new MySJ Trace feature in MySejahtera, or should you disable it?

Let’s take a look at people’s deepest fears about MySJ Trace, and find out what the facts really are!

 

MySJ Trace : Should You Enable Or Disable?

MySejahtera just introduced a new MySJ Trace feature, which uses Bluetooth technology to track your close contacts.

The proximity data it collects allows Malaysia Ministry of Health (KKM) to accurately determine if you are a close contact of a COVID-19 positive person.

KKM has been strongly urging people to turn it on, but many people are offering conflicting advice on whether to enable or disable it.

Let’s take at what people are saying, and find out what the facts really are!

 

Should You Enable MySJ Trace?

There are several good reasons to enable MySJ in MySejahtera :

  1. MySJ Trace allows for more accurate contact tracing. If you test positive for COVID-19, the data it collects lets KKM accurately identify your close contacts, and inform them.
  2. MySJ Trace automatically tracks your close contacts. All you have to do is turn it on, and forget about it.
  3. MySJ Trace removes the need to manually check out from locations, which was tedious and easy to forget.
  4. Those who use MySJ Trace will avoid being wrongly identified as casual or close contacts, due to the inaccuracy of using check-in and check-out times.

MySJ Trace gets more accurate and more useful, when more people use it. So KKM is strongly encouraging everyone to use it.

Plus, when enough people start using it, we will all enjoy an additional benefit :

  1. When enough people use MySJ Trace, we will no longer need to check-in at every location!

Read more : What You Need To Know About The New MySJ Trace Feature!
Read more : MySJ Trace : Answers To Your Frequently Asked Questions!

 

Should You Disable MySJ Trace?

Let’s take a look at some of the reasons why people are disabling MySJ Trace, and see what the facts really are!

Claim #1 : Government Uses MySJ Trace To Track Our Movements
Verdict : False

People are falsely claiming that the Malaysian government will use MySJ Trace to track our movements.

The truth is MySJ Trace does not record or collect geolocation data, so it cannot possibly track your movements.

MySJ Trace also does not transmit data, unless we consent. In fact, we are only asked to transmit MySJ Trace data if we test positive for COVID-19.

Claim #2 : MySJ Trace Not Useful Because No One Is Using It
Verdict : False

Some people are discouraging people from using MySJ Trace because “not many people are using it yet“.

Switching to MySJ Trace immediately helps you by removing the need to check-out of locations. Isn’t that useful?

For healthcare professionals who need to quickly and accurately trace close contacts of infected individuals, MySJ Trace works better when more people use it, but that doesn’t mean it’s completely useless when few people use it.

Claim #3 : Old Check-In, Check-Out System Is More Accurate
Verdict : False

Some people claim that the old method of checking in and out of locations is more accurate than MySJ Trace.

That may be true in the early days, when very few people are using it, but that is no longe true once many of your close contacts are using it.

MySJ Trace not only automatically determines who comes into close contact with you, it also logs how long they are in close contact, and their proximity (distance) to you.

The manual check-in and check-out system is unable to determine time of contact, and distance of contact; and can easily lead to false positives – people wrongly identified as casual or close contacts.

Claim #4 : MySJ Trace Uses A Lot Of Battery Life
Verdict : False

This is a real concern for many people as MySJ Trace requires Bluetooth to be turned on all the time. However, it uses Bluetooth Low Energy technology, which uses very little power.

I had earlier tested MySJ Trace on an old Samsung Galaxy S10 smartphone, and did not notice any noticeable drain on its battery life.

For people who have strong concerns over this aspect, it is possible to temporarily turn off MySJ Trace while you are at home, and only turn it on when you go out.

Claim #5 : Bluetooth Increases Risk Of Hacking
Verdict : Misleading

It is possible for criminals to hack your smartphone using Bluetooth, and it is good cybersecurity practice to turn off wireless connections that you are not using.

However, it is far more difficult to hack you through your Bluetooth connection, than your Wi-Fi connection.

After all, Bluetooth only has a range of 10 metres! The hacker will have to remain in close proximity to hack you.

Claim #6 : Hackers Can Grab Our Personal Information
Verdict : False

Some people are claiming that hackers can hack into MySJ Trace and use it to trawl for personal information of people nearby.

That’s nonsense, because MySJ Trace will only record the following information :

  • Unique User ID (UUID) that is created by the MySejahtera app.
  • Operating system version (Android or iOS)
  • Time of contact
  • Received Signal Strength Indicator (RSSI)

There is no personal information that would be useful to hackers, even if they grab these information.

The UUID, for example, is useless as an identification number without access to the KKM database of MySejahtera users and their personal information.

Claim #7 : MySJ Trace Continuously Uses Internet Data
Verdict : False

Some people are falsely claiming that MySJ Trace continuously uses Internet data, which is extremely limited for some users.

That’s not true. MySJ Trace does not require Internet connectivity, except :

  • when you first download and install MySejahtera,
  • whenever you update MySejahtera
  • when you consent to upload your MySJ Trace data to KKM

Since those are all optional, you can do it when you have access to a Wi-Fi network. You can use MySJ Trace without mobile Internet.

I hope that clarifies the reasons why you should enable or disable MySJ Trace. If you have any other questions, please feel free to ask us.

Meanwhile, I hope you can share this article with your family and friends, and encourage them to turn on MySJ Trace.

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Mobile | SoftwareTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Scam Alert : TnG eWallet 5th Anniversary Survey!

Please watch out for the TnG eWallet 5th Anniversary survey scam!

Find out why it is just a SCAM, and WARN your family and friends!

 

TnG eWallet 5th Anniversary Survey Scam Alert!

People are now sharing the TnG eWallet 5th Anniversary messages on WhatsApp :

Touch n’Go eWallet 5th Anniversary!

Click to enter to participate in the survey, have a chance to win 2000 Ringgit .

 

TnG eWallet 5th Anniversary Survey : Why This Is A Scam

Unfortunately, this is yet another survey scam, like the FamilyMart 70th Anniversary scam!

For one thing – the TnG eWallet was only launched in July 2017, so it would only be celebrating its 5th anniversary in July 2022!

TnG eWallet also confirmed that this survey is a scam.

I know many of us are in dire straits during this COVID-19 pandemic, having lost jobs, income or even loved ones.

Unfortunately, scammers are counting on our desperation to prey on us, using the same survey scam they have been using for years :

Now, let me show you how to spot these scams next time!

If you spot any of these warning signs, DO NOT PROCEED and DO NOT SHARE!

Warning Sign #1 : Bad Grammar

Most of these scammers do not have a good command of the English language, so if you spot bad grammar, stay away.

This scammer even got the spelling of the brand wrong! It’s Touch ‘n Go, not Touch n’Go.

Proper contests or events sponsored by major brands like TnG eWallet will have a PR or marketing person who will vet the text before allowing it to be posted.

Warning Sign #2 : Offering You Free Money Or Gifts

Please do NOT be naive. No one is going to give you money or free gifts just to participate in a survey!

Touch ‘n Go isn’t going to give you so much FREE money, just because it’s their anniversary.

They are a corporation whose business is to make money, not a charity to give you free money.

Warning Sign #3 : Not Using The Real Domain

A genuine TNG eWallet campaign would use their real domain – www.touchngo.com.my or www.tngdigital.com.my, not di47823.shop as shown in the scam post above.

Or they would run it off the official TnG eWallet page on Facebook – www.facebook.com/touchngoewallet/.

If you see nonsensical domains like childrerdg.xyz, uglyarticle.club, ldxqw.bar, etc. that’s a sign of a SCAM!

Warning Sign #4 : Asking You To Forward The Offer

No matter how many times you “try” this scam, you will ALWAYS win the RM 2000 “prize”.

If you don’t find that odd, you should know that no brand will insist that you must share the offer with 5 groups or 20 friends on WhatsApp.

Do not click to forward their offer to your family and friends. They will not appreciate being scammed with your help!

Warning Sign #5 : Asking You To Download + Register An App

If you click through and joined the fake survey scam, you may eventually be asked to download and register for an app.

That is VERY DANGEROUS. Never agree to download and register for any unknown app from a website.

Always download your apps from an official App Store like Google Play Store (for Android smartphones) and Apple App Store (for iPhones).

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | SoftwareTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

3 Days Later… Roblox Is Finally Up + Running Again!

Three days after they fell off the face of the Earth, Roblox is finally UP and RUNNING again!

Roblox’s CEO explains what happened…

 

3 Days Later… Roblox Is Finally Up + Running Again!

Ever since Roblox went down on 29 October 2021, they have been saying that they are “making progress” and even “identified an underlying internal cause of the outage“.

But frustrated kids… and adults who are kids at heart, spent the weekend walking around like zombies because they could no longer get their fix of Arsenal or Piggy.

Just kidding! Many of them turned to Minecraft or Among Us, because who can go a weekend without games?

Anyway…. 3 days later… Roblox finally announced that they “identified root cause and solution” and “are working on getting things back online“.

And about 7 hours later, they managed to get Roblox up and running globally!

 

Roblox CEO On What Happened…

Roblox founder and CEO, David Baszucki, later shared a little on what happened and why it took them so long to get the problems fixed.

  • it was a combination of several factors
  • there was a subtle bug in their backend service communications that is triggered under heavy load
  • a core system in their infrastructure became overwhelmed
  • it was not due to external traffic or any particular experience (e.g. Chipotle promotion)
  • the failure was due to the growth in the number of servers in their datacenters

So it looks like it really did not involve whacking their servers with a crowbar, or praying to them…

The good news is – there has been NO LOSS of player’s data, and your Roblox experience should be fully back to normal!

 

3 Days Earlier… Roblox Went Down HARD

Here’s a quick round-up of what happened three days ago, for people who have no freaking idea what happened.

A couple of days ago, Chipotle announced that they would open a virtual restaurant in Roblox, which will give away free burritos, virtual costumes and exclusive items. There’s even a fun Boorito Maze to try out!

But about 30 minutes after that Chipotle event kicked off, Roblox started experiencing problems, which snowballed until their entire platform and website fell off the face of the Earth.

That was THREE DAYS AGO… and since then, all we know is that they have been working hard to figure out what went wrong, and no, it was not Chipotle’s fault.

Read more : Roblox Down More Than 2 Days, Not Because Of Chipotle!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Gaming | SoftwareTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Roblox Down More Than 2 Days, Not Because Of Chipotle!

Roblox, has been down for MORE THAN 2 days now, but apparently, it has NOTHING to do with the massive Chipotle promotion!

Here is what we know so far…

 

Roblox Down More Than 2 Days

Roblox first experienced issues at around 7 AM on 29 October 2021, which initially affected only Games and Account Information.

But that snowballed and the entire Roblox gaming platform and website went offline, forcing them to issue a terse tweet saying that they are “working hard to get things back to normal”.

Unfortunately, they didn’t seem to be making much progress because Roblox has been down for more than two days!

That’s an eternity for an online gaming platform, especially a massively-popular one for kids… on a weekend!

At about 11 PM on 30 October, the Roblox website announced that it is “currently in maintenance mode to allow for internal work to be completed“.

More than 6 hours later – Roblox remained offline, with another round of assurance that they’re working on the problem :

Did they get locked out of their servers like Facebook earlier this month? Sounds far worse, if you ask me…

Read more : Did 13 Yr Sun Jisu Hack Facebook, WhatsApp, Instagram?

 

Roblox Went Down Not Because Of Chipotle

On 26 October 2021, Chipotle announced that it would open a virtual restaurant in Roblox, offering $1 million in free burritos!

Fans would be able to visit the virtual Chipotle restaurant to score a free burrito, by dressing up in new Chipotle-inspired Halloween virtual costumes.

They would also be able to navigate the Chipotle Boorito Maze to unlock exclusive Roblox items!

Some irate players have suggested that Roblox went down because of this Chipotle promotion, a hypothesis that had some teeth because the issues started occurring about 30 minutes after Chipotle promotion kicked off!

However, Roblox later claimed that the downtime was NOT related to the Chipotle promotion :

We know that this outage was not related to any specific experiences or partnerships on the platform.

At 5 AM on 31 October, Roblox shared that they “believe” they identified the problem :

We believe we have identified an underlying internal cause of the outage. We’re in the process of performing the necessary engineering and maintenance work to get Roblox back up and running ASAP. Thanks for your patience.

Well, Chipotle’s fault or not, kids and adults who are kids at heart around the world will be eagerly waiting for Roblox to get back online again!

Until then, enjoy these funny memes and comments by Roblox fans!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Gaming | SoftwareTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Facebook, Instagram, Messenger + Workplace Down Again!

Just days after going down for SIX HOURS, Facebook, Instagram, Messenger and Workplace went down AGAIN!

Find out what happened!

 

Facebook, Instagram, Messenger + Workplace Down Again!

Just days after all of Facebook’s services went down for six hours, Facebook, Instagram, Messenger and Workplace went down AGAIN!

At around 3:22 AM on 9 October 2021, they went down again… with people reporting that they were unable to log into their accounts, or send messages.

Fortunately, this time it didn’t take down WhatsApp and it took their engineering team just under 2 hours to get those Facebook services restored.

 

Why Did Facebook, Instagram, Messenger + Workplace Go Down Again!

Again, Facebook blamed another faulty “configuration change” for this downtime, but did not announce any details on what actually happened.

But coming right after an extraordinarily long downtime just days earlier and public testimony by Facebook whistleblower Frances Haugen, this new downtime may be shorter but is no less grievous.

It will feed growing opinion that Facebook has too much services under its control, and it’s dangerous and even folly to let a single company control so many social networks and communication services.

Regulators will no doubt be spurred by this new incident to look at breaking up Facebook.

EU antitrust chief Margrethe Vestager said that the major Facebook outage highlighted the danger of relying on just a few big players, underscoring “the need for more rivals”.

Even Russia jumped into the fray, stating that Russia was right to develop its own Internet platforms and social networks.

Russian Foreign Ministry spokesperson Maria Zakharova said that the recent 6-hour outage of Facebook services “answers the question of whether we need our own social networks and Internet platforms“.

We will be looking forward to Facebook Engineering’s explanation of what happened, and whether it involved cutting through doors to get to their servers…

Read more : Why Facebook, Messenger, WhatsApp, Instagram Went Down!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Internet | Software | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Was Facebook Taken Down By 13 Year-Old Chinese Hacker?

Was Facebook taken down by a 13 year-old Chinese hacker?

Take a look at the viral claim, and find out what the FACTS really are!

 

Claim : Facebook Was Taken Down By 13 Year-Old Chinese Hacker!

On 4 October 2021, Facebook and ALL of its messaging and social media platforms went down for about six hours, including Messenger, WhatsApp and Instagram!

Several websites, as well as people on Twitter and Facebook started claiming that Facebook was taken down by a 13 year-old Chinese hacker called Sun Jisu / Sun Ji Su / Sun Jiso / Sun Ji Soo.

There are quite a number of these claims, so just SKIP to the next section for the facts!

International media claimed that “China” was behind the suspension of social media services in the world.

According to Reuters, a Chinese hacker named “Sun Jisu” is responsible for stopping the services of “Facebook”, “WhatsApp” and Instagram, and added that the Chinese hackers are only 13 years old.

The Chinese hacker “Sun Ji Su” has topped the famous search engines and Twitter platforms during the past minutes, after disabling WhatsApp, Instagram and Facebook today 2021 in all countries of the world, amid questions among activists about the details of this information.

 

Truth : Facebook Was Not Taken Down By 13 Year-Old Chinese Hacker!

The story of a 13 year-old Chinese hacker taking down Facebook is just fake news created by fake news / clickbait websites to go viral and get money through ads.

Here are the reasons why…

Fact #1 : International Media Did Not Blame China

On one blamed China for the bizarre 6-hour downtime of Facebook, WhatsApp, Instagram and Messenger.

The international media referred to cybersecurity specialists who pointed at DNS failure as the most likely cause, not a state actor like China.

Clickbait / fake news websites intentionally added that false claim to “trigger” Chinese netizens and Sinophiles to share their fake news.

Read more : US Refused WHO Investigation Of Fort Detrick For COVID-19?

Fact #2 : Reuters  + NYT Did Not Report On Any Chinese Hacker

Reuters did not report that a 13 year-old Chinese hacker called Sun Jisu was responsible for the bringing down Facebook, WhatsApp, Instagram and Messenger.

Neither did the New York Times write about a 13 year old hacker attacking Facebook.

These are complete lies that are easily verified with a quick check on the Reuters and New York Times websites.

Fact #3 : 13 Year-Old Sun Jisu / Sun Jiso Does Not Exist

There is no 13 year-old Chinese hacker called Sun Jisu / Sun Ji Su / Sun Ji So / Sun Ji Soo. He does NOT exist.

In addition, that is a Korean name, not Chinese – a mistake that a non-Asian person would make.

Fact #4 : That Was An Old Picture Of Wang Zhengyang

The fake news websites used a picture of Chinese hacking prodigy, Wang Zhengyang, speaking at the 2014 Chinese Internet Security Conference.

Wang Zhengyang was 13 year-old at that time, and would be 20 years old this year – 2021. Here are two more pictures of him speaking at that event.

Wang Zhengyang at 2014 Chinese Internet Security Conference

Fact #5 : Facebook Services Were Brought Down By Configuration Changes

Facebook services were not brought down by a hacker, but configuration changes their own engineering team initiated internally.

Facebook’s Vice-President of Infrastructure, Santosh Janardhan, confirmed that “configuration changes” on their “backbone routers” caused the 6-hour long failure.

Our engineering teams have learned that configuration changes on the backbone routers that coordinate network traffic between our data centers caused issues that interrupted this communication. This disruption to network traffic had a cascading effect on the way our data centers communicate, bringing our services to a halt.

Read more : Why Facebook, Messenger, WhatsApp, Instagram Went Down!

Fact #6 : Access Problems Were Caused By Same Servers

Facebook run their internal systems through the same servers, so they became inaccessible when those servers were taken offline.

This included security systems that controlled the fob door locks, with a New York Times reporter tweeting that Facebook staff were unable to gain access to an unspecified office using their keycards.

However, many Facebook staff are working from home due to COVID-19 precautions, so this was only a big problem for engineers trying to gain access to the Facebook data centre in Santa Clara, California.

At no time was this security issue caused by a hacker. It was due to the same servers that went offline.

Read more : Why Facebook, Messenger, WhatsApp, Instagram Went Down!

Now that you know the truth, please SHARE this fact check with your family and friends!

Also, please STOP SHARING fake stories created by fake news / clickbait websites!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | Business | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Did 13 Yr Sun Jisu Hack Facebook, WhatsApp, Instagram?

Did the 13 year-old Chinese hacker, Sun Jisu, hack Facebook, WhatsApp and Instagram, causing them to fail for more than 6 hours?

Take a look at the new viral claim, and find out what the FACTS really are!

 

Claim : 13 Year-Old Sun Jisu Hacked Facebook, WhatsApp, Instagram!

On 4 October 2021, Facebook and ALL of its messaging and social media platforms went down for about six hours, including Messenger, WhatsApp and Instagram!

Some websites and people on Twitter and Facebook started claiming that the failure was due to a 13 year-old Chinese hacker called Sun Jisu / Sun Ji Su / Sun Jiso / Sun Ji Soo.

There are quite a number of these claims, so just SKIP to the next section for the facts!

International media claimed that “China” was behind the suspension of social media services in the world.

According to Reuters, a Chinese hacker named “Sun Jisu” is responsible for stopping the services of “Facebook”, “WhatsApp” and Instagram, and added that the Chinese hackers are only 13 years old.

The Chinese hacker “Sun Ji Su” has topped the famous search engines and Twitter platforms during the past minutes, after disabling WhatsApp, Instagram and Facebook today 2021 in all countries of the world, amid questions among activists about the details of this information.

 

Truth : Sun Jisu Doesn’t Exist, Did Not Hack Facebook, WhatsApp, Instagram!

The truth is – this is just fake news created by fake news / clickbait websites to go viral and get money through ads.

Here are the reasons why…

Fact #1 : International Media Did Not Blame China

No mainstream media blamed China for the bizarre 6-hour downtime of Facebook, WhatsApp, Instagram and Messenger.

Practically all of them referred to cybersecurity specialists who pointed at DNS failure as the most likely cause, not a state actor like China.

Clickbait / fake news websites intentionally added that false claim to “trigger” Chinese netizens and Sinophiles to share their fake news.

Read more : US Refused WHO Investigation Of Fort Detrick For COVID-19?

Fact #2 : Reuters  + NYT Did Not Report On Any Chinese Hacker

Reuters did not report that a 13 year-old Chinese hacker called Sun Jisu was responsible for the bringing down Facebook, WhatsApp, Instagram and Messenger.

Neither did the New York Times write about a 13 year old hacker attacking Facebook.

These are complete lies that are easily verified with a quick check on the Reuters and New York Times websites.

Fact #3 : 13 Year-Old Sun Jisu / Sun Ji Soo Does Not Exist

There is no 13 year-old Chinese hacker called Sun Jisu / Sun Ji Su / Sun Ji So / Sun Ji Soo. He does NOT exist.

In addition, Sun Jisu / Sun Ji Soo is a Korean name, not Chinese. This is a mistake that a non-Asian person would make.

Fact #4 : That Was An Old Picture Of Wang Zhengyang

The fake news websites used a picture of Chinese hacking prodigy, Wang Zhengyang, speaking at the 2014 Chinese Internet Security Conference.

Wang Zhengyang was 13 year-old at that time, and would be 20 years old this year – 2021. Here are two more pictures of him speaking at that event.

Wang Zhengyang at 2014 Chinese Internet Security Conference

Fact #5 : Facebook Services Were Brought Down By Configuration Changes

Facebook services were not brought down by a hacker, but configuration changes their own engineering team initiated internally.

Facebook’s Vice-President of Infrastructure, Santosh Janardhan, confirmed that “configuration changes” on their “backbone routers” caused the 6-hour long failure.

Our engineering teams have learned that configuration changes on the backbone routers that coordinate network traffic between our data centers caused issues that interrupted this communication. This disruption to network traffic had a cascading effect on the way our data centers communicate, bringing our services to a halt.

He also asserted that it was a faulty configuration change, and no user data was compromised.

Our services are now back online and we’re actively working to fully return them to regular operations. We want to make clear at this time we believe the root cause of this outage was a faulty configuration change. We also have no evidence that user data was compromised as a result of this downtime.

Read more : Why Facebook, Messenger, WhatsApp, Instagram Went Down!

Fact #6 : Access Problems Were Caused By Same Servers

Facebook run their internal systems through the same servers, so they became inaccessible when those servers were taken offline.

This included security systems that controlled the fob door locks, with a New York Times reporter tweeting that Facebook staff were unable to gain access to an unspecified office using their keycards.

However, many Facebook staff are working from home due to COVID-19 precautions, so this was only a big problem for engineers trying to gain access to the Facebook data centre in Santa Clara, California.

At no time was this security issue caused by a hacker. It was due to the same servers that went offline.

Read more : Why Facebook, Messenger, WhatsApp, Instagram Went Down!

Now that you know the truth, please SHARE this fact check with your family and friends!

Also, please STOP SHARING fake stories created by fake news / clickbait websites!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | Software | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Why Facebook, Messenger, WhatsApp, Instagram Went Down!

Facebook and ALL of its messaging and social media platforms went down for about six hours, including Messenger, WhatsApp and Instagram!

Find out why they all went down at the same time, and for so long!

 

Facebook, Messenger, WhatsApp, Instagram + More DOWN!

The entire slew of messaging and social media platforms owned by Facebook was inaccessible for about six hours, including :

  • Facebook
  • Facebook Messenger
  • WhatsApp
  • Instagram
  • Oculus
  • Workplace

The failure also extended to Facebook authentication, which you may be using to log into third-party apps and games, with Pokemon Go and Match Master gamers have reported problems logging in.

This left Twitter as the only major social media network still up and running, which is ironic since it became the only way for Facebook to reach out to the world…

This massive outage couldn’t come at a worse time for Facebook, whose stock slumped about 5.5% after former employee and whistleblower, Frances Haugen, leaked internal documents to the Wall Street Journal.

She also accused her former firm of repeatedly and knowingly allowing the proliferation of hate speech and misinformation for profit. Really tough times for Team Zuckerberg indeed…

Even Edward Snowden chimed in, saying that the world has become a healthier place for one shining day…

 

Why Did Facebook, Messenger, WhatsApp, Instagram, etc. Go DOWN?

This massive, unprecedented GLOBAL outage appears to be caused by a DNS (Domain Name Server) failure.

The DNS service “translates” the plaintext link we use (www.facebook.com for example) into its actual numerical IP address (123.123.123.123 for example), allowing your app or browser to connect to the right server.

Without a working DNS service, no one is able to connect to any Facebook-owned service because the Internet no longer knows how to locate the right server.

CloudFlare senior vice-president Dane Knecht shared that the Facebook BGP (Border Gateway Protocol) routes have been “withdrawn from the Internet”, causing failure to connect through CloudFlare’s DNS service.

This was likely due to a configuration error on Facebook’s side, but coming one day after the story broke on Frances Haugen? It would be folly to rule out internal sabotage or a rush to remove some controversial features before she testified to the US Congress.

The conspiracy theory that it was a DDOS (Distributed Denial-of-Service) attack by Anonymous or some vigilante group is really farfetched. It would require an incredible amount of resources and coordination to not only bring down Facebook, but all the other services as well… at the same time!

Read more : Did 13 Year Old Sun Jisu Hack Facebook, WhatsApp, Instagram?

Facebook’s Vice-President of Infrastructure, Santosh Janardhan, later confirmed that “configuration changes” on their “backbone routers” caused the 6-hour long failure.

Our engineering teams have learned that configuration changes on the backbone routers that coordinate network traffic between our data centers caused issues that interrupted this communication. This disruption to network traffic had a cascading effect on the way our data centers communicate, bringing our services to a halt.

He also asserted that it was a faulty configuration change, and no user data was compromised.

Our services are now back online and we’re actively working to fully return them to regular operations. We want to make clear at this time we believe the root cause of this outage was a faulty configuration change. We also have no evidence that user data was compromised as a result of this downtime.

While he blamed “the underlying cause” for impacting their ability. to “quickly diagnose and resolve the problem”, it is notable that it took Facebook engineering teams more than 6 hours to resolve a DNS failure.

It is now believed that the changes were made to Facebook’s Border Gateway Protocol, a mechanism that exchanges routing information to help figure out the fastest route for any request.

Apparently, the changes “withdrew” Facebook services from the DNS system, making it impossible for anyone to connect to them.

Even worse, Facebook ran their own systems through the same servers, so everything from engineering tool, messaging services and even security systems that controlled the key fob locks were no longer accessible.

So their engineering team had to rush to their data centres to manually reset the servers there.

Needless to say, this will be a big wake-up call for their engineering teams, and in the words of Russell Peters – “Somebody’s gonna get a hurt real bad!

It is also a big wake-up call for everyone using Facebook services. This massive outage is a reminder that we should NOT put all our eggs in one basket.

I believe it will at least temporarily spur the adoption of alternative messaging services like Telegram and Signal. Even Twitter should see a nice boost in Tweets and maybe new users.

Now, I’m not into conspiracy theories… but what are the odds of this failure happening just one day after Frances Haugen came out publicly against Facebook, and a day before she was set to testify before the US Congress?

Could these “configuration changes” be designed to remove some controversial features before Haugen’s testimony to the US Congress?

Could Facebook’s own engineering team have accidentally triggered the failure in their rush to remove those controversial features before she testified?

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Internet | Software | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Verified : KKM + MySejahtera SMS Messages Are Legit!

Are scammers sending fake SMS messages from KKM and MySejahtera to scam you out of your money?

Take a look at the viral post, and find out what the FACTS really are!

 

Claim : KKM + MySejahtera SMS Messages Are Fake!

People have been sharing a screenshot of two SMS messages from KKM (Malaysia Ministry of Health) and MySejahtera, claiming that they are scam messages.

RM0 MySejahtera: You are COVID-19 positive. Kindly refresh your MySejahtera Profile and click to declare your close contact: https://bit.ly/3jNvOqL

RM0 KKM Anda adlh COVID19 positif & masih belum menjawab status kesihatan hari ini. Segera lengkapkan H.A.T. di MySejahtera. Rujuk https://bit.ly/2VMaWrC

This is a scam. If receive don’t click. Please inform all ur family members and friends ….NETIZEN WATCHDOG

Many also include a link to the Kuan Evening Edition video to prove that these messages are indeed fake messages used by scammers in “phishing attacks”.

 

Truth : KKM + MySejahtera SMS Messages Are Legit!

The SMS messages in the screenshot are legit, and came from KKM and MySejahtera.

The truth is that viral message is FAKE NEWS, and here are the facts…

Fact #1 : The MySejahtera SMS Message Is Legitimate

The MySejahtera SMS message in English is legitimate. It warns you that you have tested positive for COVID-19.

You are therefore required to declare your close contacts in the MySejahtera app or website.

The link – https://bit.ly/3jNvOqL – leads to the Close Contact reporting page in the MySejahtera website (https://mysejahtera.malaysia.gov.my/help/closecontact/).

Fact #2 : The KKM Telephone Number Is Genuine

On 24 September 2021, KKM confirmed that the 03-2703-3000 telephone number is genuine.

The Malaysia Ministry of Health uses that telephone number to call those identified as COVID-19 positive to fill up their Home Assessment Tool (HAT) in the MySejahtera app.

Fact #3 : The KKM SMS Message Is Legitimate

The KKM SMS message in Bahasa Malaysia is also legitimate.

It is a reminder that you did not fill in your Home Assessment Tool (HAT) in the MySejahtera app today.

Those who are under home quarantine must complete that home assessment test every day.

The Ministry of Health may issue a compound if you fail to perform the home assessment test, as required.

The link in the SMS – https://bit.ly/2VMaWrC – actually leads to a PDF infographic on the Home Assessment Tool (HAT) – https://www.infosihat.gov.my/images/media_sihat/poster/pdf/DiManakahHAT.pdf

The infographic explains who needs to perform self-monitoring using the HAT feature, and how to do it in the MySejahtera app.

Now that you know the truth, please SHARE this fact check, so your family and friends won’t be fooled by the fake news!

It is critical that everyone understands that these alerts are genuine, and take them seriously!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Jaya Grocer 20th Anniversary Scam Alert!

Please watch out for the Jaya Grocer 20th Anniversary survey scam!

Find out why it is just a SCAM, and WARN your family and friends!

 

Jaya Grocer 20th Anniversary Survey Scam Alert!

People are now sharing these Jaya Grocer 20th Anniversary messages on WhatsApp :

Jaya Grocer 20th Anniversary!

Click to enter to participate in the survey, have a chance to win $1000!

Jaya Grocer 20th Anniversary!

Through the questionnaire, you will have a chance to get 2000 Ringgit .

 

Jaya Grocer 20th Anniversary Survey : Why This Is A Scam

Unfortunately, this is yet another survey scam, like the FamilyMart 70th Anniversary scam!

For one thing – Jaya Grocer was established in 2007, with its first outlet in Jaya 33 in Petaling Jaya 2007.

So they would only be celebrating their 20th anniversary in 2027!

Jaya Grocer also confirmed that this survey is a scam.

I know many of us are in dire straits during this COVID-19 pandemic, having lost jobs, income or even loved ones.

Unfortunately, scammers are counting on our desperation to prey on us, using the same survey scam they have been using for years :

Now, let me show you how to spot these scams next time!

If you spot any of these warning signs, DO NOT PROCEED and DO NOT SHARE!

Warning Sign #1 : Bad Grammar

Most of these scammers do not have a good command of the English language, so if you spot bad grammar, stay away.

Proper contests or events sponsored by major brands like Jaya Grocer will have a PR or marketing person who will vet the text before allowing it to be posted.

Warning Sign #2 : Offering You Free Money Or Gifts

Please do NOT be naive. No one is going to give you money or free gifts just to participate in a survey!

Jaya Grocer isn’t going to give you FREE money, just because it’s their anniversary.

They are a corporation whose business is to make money, not a charity to give you free money.

Warning Sign #3 : Not Using The Real Jaya Grocer Domain

A genuine Jaya Grocer campaign would use their real domain – www.jayagrocer.com.

Or they would run it off the official Jaya Grocer page on Facebook – www.facebook.com/jayagrocer/.

If you see nonsensical domains like uglyarticle.club, ldxqw.bar, etc. that’s a sign of a SCAM!

Warning Sign #4 : Asking You To Forward The Offer

No brand will insist that you must share the offer with 5 groups or 20 friends on WhatsApp.

Do not click to forward their offer to your family and friends. They will not appreciate being scammed with your help!

Warning Sign #5 : Asking You To Download + Register An App

If you click through and joined the fake survey scam, you will eventually be asked to download and register for an app.

That is VERY DANGEROUS. Never agree to download and register for any unknown app from a website.

Always download your apps from an official App Store like Google Play Store (for Android smartphones) and Apple App Store (for iPhones).

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > CybersecurityBusiness | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Did Giant Tsunami Waves Hit Second Penang Bridge?

Did giant tsunami waves hit the second Penang bridge – the Sultan Abdul Muadzam Shah Bridge?

Find out what the facts really are!

Updated @ 2021-08-22 : Updated parts of the article, and the fact check video.

Originally posted @ 2020-12-02

 

Claim : Giant Tsunami Waves Hit Second Penang Bridge!

A video claiming to show the Second Penang Bridge getting hit by giant tsunami waves, is going viral on social media… again!

Giant tsunami waves hit Penang 2nd bridge at 6.00pm yesterday!

Dramatically, a person appeared to be swept away by a giant wave, and a motorcyclist quickly fled another giant wave!

Here is my video fact check video of two examples I found so far…

 

Truth : Tsunami Waves Did NOT Hit Second Penang Bridge!

This is yet another example of fake news spreading like COVID-19 on social media.

The video is genuine, but it does NOT show giant tsunami waves hitting the Second Penang Bridge.

Fact #1 : This Bridge Is Too Small To Be Second Penang Bridge

In the main span, the Second Penang Bridge has a height clearance of 30 metres for ships to pass under. The bulk of the bridge has a much lower 6 metre clearance.

The Second Penang Bridge is also very wide – between 150 and 250 metres, with 4 car lanes and 2 motorcycle lanes.

The bridge in the video appears to be much shorter, with a 4 metre clearance; and much narrower with just 2 lanes.

Fact #2 : No Report Of Any Tsunami Affecting Penang

There have been no earthquakes nearby, or reports of any tsunami affecting Penang.

The waves appear to be approximately 12-15 metres high, and would have been big news. Yet there is no mention of it in the mainstream media. Very sus, no?

Fact #3 : It Was An Old Video

This video went viral earlier in July 2020, when it was posted as evidence of a tsunami hitting a bridge in Alaska after an earthquake there. However, that was false as well.

The earliest we could find was a December 2017 tweet by a CNBC-AWAAZ anchor, Deepali Rana, who claimed that it was a video of the Bandra-Worli Sea Link. That was also false!

Fact #4 : The Video Was Recorded On Minicoy Island

The video was recorded on 23 August 2017, showing giant waves hitting the Eastern Jetty at Minicoy Island (Maliku), in Lakshadweep, India.

It is a much smaller structure than the second Penang bridge, or the Bandar-Worli Sea Link bridge.

Here is a picture of the Eastern Embarkation Jetty, with a surfer for size comparison.

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | TravelTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

FamilyMart 70th Anniversary Survey Scam Alert!

Please watch out for the FamilyMart 70th Anniversary survey scam!

Find out why it is just a SCAM, and WARN your family and friends!

 

FamilyMart 70th Anniversary Survey Scam Alert!

People are now sharing these FamilyMart 70th Anniversary messages on WhatsApp :

FamilyMart 70th Anniversary!

Click to enter to participate in the survey, have a chance to win $1000!

FamilyMart 70th Anniversary!

Through the questionnaire, you will have a chance to get 2000 Ringgit .

 

FamilyMart 70th Anniversary Survey : Why This Is A Scam

Unfortunately, this is yet another survey scam.

For one thing – FamilyMart was established in Sayama, Japan in September 1973 and incorporated on 1 September 1981.

So they would only be celebrating their 70th anniversary in September 2043 or September 2051!

I know many of us are in dire straits during this COVID-19 pandemic, having lost jobs, income or even loved ones.

Unfortunately, scammers are counting on our desperation to prey on us, using the same survey scam they have been using for years :

Now, let me show you how to spot these scams next time!

If you spot any of these warning signs, DO NOT PROCEED and DO NOT SHARE!

Warning Sign #1 : Bad Grammar

Most of these scammers do not have a good command of the English language, so if you spot bad grammar, stay away.

Proper contests or events sponsored by major brands like FamilyMart will have a PR or marketing person who will vet the text before allowing it to be posted.

Warning Sign #2 : Offering You Free Money Or Gifts

Please do NOT be naive. No one is going to give you money or free gifts just to participate in a survey!

FamilyMart isn’t going to give you FREE money, just because it’s their anniversary.

They are a corporation whose business is to make money, not a charity to give you free money.

Warning Sign #3 : Not Using The Real FamilyMart Domain

A genuine FamilyMart Malaysia campaign would use the real FamilyMart Malaysia domain – www.familymart.com.my.

Or they would run it off the official FamilyMart Malaysia page on Facebook – www.facebook.com/FamilyMartMY/.

If you see nonsensical domains like uglyarticle.club, ldxqw.bar, etc. that’s a sign of a SCAM!

Warning Sign #4 : Asking You To Forward The Offer

No brand will insist that you must share the offer with 5 groups or 20 friends on WhatsApp.

Do not click to forward their offer to your family and friends. They will not appreciate being scammed with your help!

Warning Sign #5 : Asking You To Download + Register An App

If you click through and joined the fake survey scam, you will eventually be asked to download and register for an app.

That is VERY DANGEROUS. Never agree to download and register for any unknown app from a website.

Always download your apps from an official App Store like Google Play Store (for Android smartphones) and Apple App Store (for iPhones).

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | BusinessTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Scam Alert : COVID-19 Relief Fund By Federal Government!

Please watch out for the COVID-19 Relief Fund by Federal Government scam!

Find out why it is just a SCAM, and WARN your family and friends!

 

Scam Alert : COVID-19 Relief Fund By Federal Government!

People are now sharing this COVID-19 RELIEF FUND message on WhatsApp :

Apply For The Covid-19 Relief Fund Provided By The Federal Government. Hurry Up, It takes few seconds to apply. Dont [sic] miss this opportunity.

Apply Here

Note : I added the Scam Alert overlay to prevent it from being further abused.

 

COVID-19 Relief Fund : Why This Is A Scam

I know many of us are in dire straits during this COVID-19 pandemic, having lost jobs, income or even loved ones. Unfortunately, scammers are counting on our desperation to prey on us.

I will now show you why this COVID-19 Relief Fund message is just another scam. Please warn your family and friends!

Fact #1 : No Global Relief Fund By Any Federal Government

When a scam tells you that “the federal government” is giving away money, you should always ask yourself – WHICH federal government???

No government in the world is giving away money to anyone across the world. Not even the three richest economies in the world – US, China and the EU – have a COVID-19 relief fund to give money away like that.

Fact #2 : The Three Questions Are A Red Herring

Most of these scams employ simple but useless questions to trick you into thinking that this is genuine. Look at the three questions this scam is asking :

  • What’s your age range?
  • How much money do you want to receive?
  • What’s your employment status?

In a real government relief programme, your eligibility status will be based on some official document – your identity card, driver’s licence, passport, etc.

No one is going to give you money simply because you answer a few questions. And NO ONE is ever going to ask you how much you want to receive!

Fact #3 : No Government Will Ask You To Invite Friends / Groups

A real government relief programme will NEVER ask you to invite friends and groups on WhatsApp, much less insist that you invite 15 friends or 5 groups before they give you money.

That’s a dead giveaway that this is a scam, and the scammers want you to help them scam other people. So NEVER invite your friends to join the scam.

Fact #4 : SNF Global Relief Initiative Is Not By Any Federal Government

To make the scam look legit, the scammers used the SNF Global Relief Initiative for the COVID-19 Pandemic graphics.

That initiative is not by any government, but by the Stavros Niarchos Foundation (SNF).

And just in case you are wondering, no, the SNF does not give away money to individuals. They only make grants to non-profit organisations and collaborative funds.

Fact #5 : The Domain Is New + Protected

If you check the domain “relief-fund.live“, you will see that it was only created on 24 March 2021.

Even more suspiciously, all contact and ownership details have been REDACTED FOR PRIVACY. That’s often a sign that the owners are worried about being sued or prosecuted.

Name: relief-fund.live
Registry Domain ID: ac787c4c5c19460696fa1bf46d133faa-DONUTS

Nameservers:
dns1.registrar-servers.com
dns2.registrar-servers.com

Registry Expiration: 2022-03-24 11:41:35 UTC
Updated: 2021-03-29 11:42:31 UTC
Created: 2021-03-24 11:41:35 UTC

Name: REDACTED FOR PRIVACY
Organization: Privacy service provided by Withheld for Privacy ehf
Email: Please query the RDDS service of the Registrar of Record identified in this output for information on how to contact the Registrant, Admin, or Tech contact of the queried domain name.
Tel: REDACTED FOR PRIVACY
Fax: REDACTED FOR PRIVACY
Mailing Address: REDACTED FOR PRIVACY Capital Region REDACTED FOR PRIVACY IS

Fact #6 : The Comments Are Completely Faked

You may notice a bunch of comments at the bottom of the scam website. They are only there to trick you into thinking that other people received the money.

Try refreshing them. They will never change, unlike a real live comment stream. The time codes will not change either.

Try clicking on the Like option. Nothing will happen. Your Like will not register.

That’s because this is a fake comment stream. It’s all hardcoded and fixed.

Now that you know that this is just another scam, please warn your family and friends.

And please remember – no one gives away money like that. Don’t fall for these scams!

 

Help Support My Work!

If you would like to support my work, you can do so via bank transfer /  PayPal / credit card.

Name : Adrian Wong

Credit Card / Paypal : https://paypal.me/techarp
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)

Thank you in advanced! ❤️

 

Recommended Reading

Go Back To > Fact Checks | Tech ARP

 

Support Tech ARP!

If you like our work, please support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Thank you!

Is There A Communist Revolution Monument In Penang?

Pictures of a Chinese Communist Revolution Monument in Penang have gone viral, with calls from netizens to TEAR IT DOWN!

Find out what’s going on, and what the facts really are!

 

Claim : DAP Created A Communist Monument In Penang!

Pictures of a Chinese Communist Revolution Monument in Penang are being shared on Facebook and social media, with messages like this (translated into English) :

DAP created a Communist monument in Penang after they took power.

Communist monument on Flag Hill in Penang.

What are you waiting for? When are you going to tear it down?

Do You Know?

In Penang, there is a World War II memorial called the Revolution Memorial.

But it’s full of Chinese letters and the figures are all dressed as Communists.

There is absolutely no information in English or Bahasa Melayu, much less Tamil.

When people say it’s racist, [you get] angry

This monument was built as soon as DAP took over Penang from Gerakan.

Here is a selection of comments that were posted with that misleading picture, showing how it instigates hate and racial tensions :

Roboh kan semuanya,, pulau Pinang ialah tanah Melayu,,jgn lupa tu,, DAP memang haprak

Demolish it all. Penang is Malay soil. Don’t forget that. DAP is useless.

Say no to komunis DAP

Puak2 pengkhianat DAP..musoh melayu..musoh islam..

DAP are traitors, enemies of the Malays, enemies of Islam.

Robohkan Tugu peringatan pembunuh anak anak peribumi Melayu. kenapa di iarkan sebegitu rupa di mana anguta dan bekas angguta keselamatan kita boleh biarkan sebegitu rupa…Letupkan !

Destroy the memorial of the killers of Malay natives. Why is it being left like that? How can our security forces let this be? Blow it up!

 

Communist Revolution Monument In Penang : The Truth

The short version is this – the monument in the pictures exists, but it is neither a Communist monument, nor was it created or built by DAP.

All of the claims about it in the incendiary posts above are FALSE.

We would like to warn everyone to be careful of political fake news being shared to incite hatred and racial tensions.

Fact #1 : That Is The Penang Overseas Chinese Anti-War Memorial

The monument in the picture is the Penang Overseas Chinese Anti-War Memorial Park, also known as the Air Itam War Memorial Park.

It is NOT a Chinese Communist Revolution Monument.

There are two key monuments at this memorial park :

  • a bronze-coloured army supply truck being pushed by three men – memorialising the Nanyang transport volunteers from Malaya, who helped deliver supplies to China when they were blocked by the Japanese.
  • a 45-foot tall white obelisk that commemorates the Marco Polo Incident, that kicked off the Second Sino-Japanese War of 1937-1945.

The ashes of some 800 incomplete skeletons of Penang Chinese residents who died under Japanese occupation, and the Nanyang transport volunteers who died, are also buried under the obelisk.

The truck also has a number plate with the date 1939 on it. Communist China didn’t exist in 1939, so claims that this is a Communist monument is… idiotic.

Fact #2 : It Was Built In 1946 And Opened In 1951

Construction on the Penang Overseas Chinese Anti-War Memorial Park started in 1946, and it was officially opened in 1951.

DAP was only formed on 11 October 1965, so the claim that it was built when DAP gained power in Penang is false.

Because the People’s Republic of China was only established in 1949, the claim that this is a communist revolution monument is idiotic.

It is also extremely stupid to claim that the figures were dressed as Chinese Communists, because Communist China didn’t exist when the monument was being built!

Fact #3 : It Was Privately Funded

The original Penang Overseas Chinese Anti-War Memorial Park was funded entirely by the Penang China Relief Fund, a Penang-based private fundraising organisation.

It was officially opened at 11 AM on 11 November 1951 by Penang Chinese tycoon and philanthropist, Lim Lean Teng, who was the supervisory chairman of the organisation.

After the Penang China Relief Fund was dissolved in 1952, the Kong Min School was entrusted to maintain the memorial with an annual budget of $5,000, and an annual memorial service.

Fact #4 : It Was Upgraded For Its 60th Anniversary

The Board of Trustees of the Kong Min School decided to repair and upgrade the memorial to coincide with its 60th anniversary.

The RM 400,000 project also added a 60 foot-long wall relief showing Malayan transport volunteers on the Burma-China road, and a peace column with flying doves.

On top of private donations by various organisations and individuals, the Penang state government also chipped in.

When it was opened at precisely 11:11 AM on 11 November 2016 by Penang Chief Minister, Lim Guan Eng, politicians from both sides of the political divide attended the launch.

Therefore, the claim that no one knew about it, or that it was only something DAP would do, is categorically FALSE.

Photo Credit : The Sun Daily

Fact #5 : There Is Information In FOUR Languages

The memorial park has information in four languages – English, Bahasa Melayu, Chinese and Japanese.

Here is the information panel in English and Bahasa Melayu, proving that the claim there is no information in both languages are FALSE.

 

Help Support My Work!

If you would like to support my work, you can do so via bank transfer /  PayPal / credit card.

Name : Adrian Wong

Credit Card / Paypal : https://paypal.me/techarp
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)

Thank you in advanced! ❤️

 

Recommended Reading

Go Back To > Fact CheckHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Was Pragya Mishra Killed Over COVID-19 Comments?

Was Indian journalist, Pragya Mishra, murdered in broad daylight after criticising the Kumbh Mela festival for causing the catastrophic COVID-19 surge?

Find out what the viral video of her murder showed, and what the FACTS really are!

 

Claim : Pragya Mishra Killed In Broad Daylight Over COVID-19 Comments!

Two videos and a photo are going viral on WhatsApp, claiming that Indian journalist Pragya Mishra was killed in broad daylight after she criticised the recent Kumbh Mela festival in India for causing the catastrophic surge in COVID-19.

The first video showed the news segment in which Pragya Mishra talked about the Kumbh Mela and the COVID-19 tsunami.

The second video was CCTV footage showing a woman getting stabbed by a man in broad daylight.

The videos are accompanied by one or two pictures showing the woman lying in a pool of blood, with one of these messages :

An Indian broadcaster who spoke against unhealthy Hindu gatherings and the spread of Corona disease was assassinated publicly.

Pragya mishra murdered in broad daylight

Because she was talking in news about kumbh mela in the era of cornavirus

 

No! Pragya Mishra Was NOT Killed Over COVID-19 Comments!

This is yet another COVID-19 related hoax. Pragya Mishra is alive and well.

It has been suggested that the fake news was created as a kind of warning to Pragya Mishra –  watch what you are saying about Hindus and the Kumbh Mela, or else…

That is something we cannot prove, but here are the facts that we can prove…

Fact #1 : Pragya Mishra Is Alive And Well

These videos and photos first circulated on or just before 18 April 2021.

At that time, Pragya Mishra was at home because of “COVID-19 protocols”. When she was informed about the videos and photos, she tweeted that she was safe.

As of 30 April 2021, she’s still active on her Twitter account, @PragyaLive.

Fact #2 : Second Video Was Of A Real Murder

Unfortunately, the second video is genuine, and shows the murder of a real woman on 10 April 2021.

It was not Pragya Mishra, but a 26 year-old lady called Neelu Mehta, who worked at the Safdarjung Hospital in Delhi.

She was stabbed and murdered in broad daylight by her husband, Harish Mehta, an employee of the Marriage Bureau.

Allegedly, he suspected his newly-wed wife of eight months of infidelity, and stabbed her to death. Even after she died, he continued stabbing her.

Sadly, no one intervened or tried to help her.

 

Help Support My Work!

If you would like to support my work, you can do so via bank transfer /  PayPal / credit card.

Name : Adrian Wong

Credit Card / Paypal : https://paypal.me/techarp
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)

Thank you in advanced! ❤️

 

Recommended Reading

Go Back To > Fact ChecksHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Scam Alert : CIMB Customers Hit By Fake SMS Messages!

Scammers continue to target CIMB customers, using many different kinds of fake SMS messages.

Do NOT click or call if you receive any of these fake SMS messages!

And please warn your family and friends!

 

Scam Alert : CIMB Customers Hit By Fake SMS Messages!

Whether you are a CIMB Bank customer or not, you may receive one of these alarming SMS messages :

RM 0.00 CIMB: Confidential!

Dear CIMB users, your account will TERMINATED on 24/12/20. Verify via http://www.cimbclickikm.cc to keep on using CIMB Clicks services.

Please make verification within 24hours to avoid service interruption.

RM0 CIMB: Instant Transfer RM4998.78 to CHAY LEE FEN/HONG LEONG on 23-Dec-2020, 13:06:35. Call the no. at the back of your card for queries.

If you receive any of these SMS messages, please DO NOT click on the link, or call the number. JUST IGNORE THEM, or delete them.

RM0.00 CIMB: MYR 2968.00 was charged on your card num 4204 at Shopee.MY. If this is not your txn, call 1800-9767 now.

Cimb Your account is judged as high risk by the system, PLS re-verify your account. cimbclicksecurity.com

Note : These scams do not just affect CIMB Bank. In fact, all banks are affected :

 

Why These CIMB SMS Messages Are Fake

Let us show you how to identify these fake CIMB SMS messages.

If you spot any of these warning signs, BACK OFF and DO NOT PROCEED!

Warning Sign #1 : Grammatical Mistakes

If you carefully read the first SMS messages above, you can easily spot numerous grammatical mistakes. A bank will never send such poorly worded messages to their customers.

However, they may copy the real SMS message from CIMB to trick you into thinking that this is a real transaction. Such fake SMS messages will have proper grammar.

Warning Sign #2 : Embedded Links

Banks will NEVER embed links (URLs) into the message. If you see embedded links, always think – SCAM SMS!

Unlike the Public Bank SMS scam, they used a copy of the real SMS message to trick you into clicking the URL in the first message.

Warning Sign #3 : Wrong Links

And always check the link – www.cimbclickikm.cc and cimbclicksecurity.com are not the correct addresses for the CIMB Bank websites (www.cimbclicks.com.my or www.cimb.com.my).

The best policy is to manually key in the bank website address. NEVER click on any link in an SMS, even if it looks legit.

When you see any website with .cc links, be wary because the .CC domains are registered in the Cocos (Keeling) Islands – an Australian territory of only 14 km², with only about 600 inhabitants.

Warning Sign #4 : No Personal Login Phrase / Picture

To avoid phishing attacks, banks now give you a secret response (like a picture or a phrase) to confirm that you are visiting their legitimate website.

If the website you are visiting gives you the wrong picture or secret phrase, you have been tricked into visiting a fake website designed to mimic the real bank website.

You should also remember that the bank website must show you secret picture or phrase right after you enter your login, but BEFORE you key in your password.

If you are asked to key in your password without the website displaying the secret phrase or picture, you have been tricked into visiting a fake website designed to mimic the real bank website.

 

CIMB Advice To Protect Against Fake SMS / Email Scams

Here is a list of DOs and DON’Ts to protect yourself against fake SMS / email scams.

Please DO follow these good practices

  1. Pay attention to your transaction alerts and check your account activities regularly. In case of any unusual activity, please contact us immediately.
  2. If you wish to contact us, ONLY call the number on the back of your card or refer to CIMB website “Contact Us” page.
  3. Always check the URL of the website that you are making purchases from. Ensure  the “lock” icon or “https” appears on the website’s address bar.
  4. Always find a reputable seller on online marketplaces by searching for reviews from other customers to know their experience.
  5. To access CIMB Clicks, type the entire URL as follows: www.cimbclicks.com.my
  6. Always remember to log out once you have completed your banking transactions.

Please DO NOT follow these bad practices

  1. Don’t panic and give personal information to fraudsters impersonating representatives of government agencies etc. even if they deploy fear tactics. Immediately call the number on the back of your card to verify with CIMB.
  2. Never apply for personal financing through unverified links or individuals promising a lower rate. CIMB does not impose any application charges for personal financing applications.
  3. Never take instructions from anyone to change the mobile number in CIMB records to any number other than your own mobile number.
  4. When transacting online, never continue with a purchase if you have any doubts if the seller is not genuine.
  5. Never share details such as your card number / User ID / PIN / password / TAC  with anyone or key them in in any website other than CIMB Clicks.
    (Note: CIMB will never ask for  your ‘User ID’, ‘Password’ or ‘TAC’ under any circumstances outside of CIMB Clicks).
  6. Do not click on links or open email attachments from unknown / unreliable senders / sources.
    (Note: Emails from CIMB will always end with @cimb.com such as cimb.marketing@cimb.com

 

Recommended Reading

Go Back To > Cybersecurity | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Scam Warning : Public Bank Customers Hit By Fake SMS!

Scammers continue to target Public Bank customers, using many different kinds of fake SMS messages.

Do NOT click or call if you receive any of these fake SMS messages!

 

Public Bank : Fake SMS Scam Warning! Do NOT Click / Call!

Whether you are a Public Bank customer or not, you may receive one of these alarming SMS messages.

Please DO NOT click on the link, or call the number. JUST IGNORE THEM, or delete them.

The safest thing to do is NEVER CLICK ON A LINK in any SMS. If you need to log into your bank account, key in the website address manually.

RM0 PBB/PIBB: Your PBB account will TERMINATED on 02Dec20 01:30:00 AM. Please make verification via http://www.mypbebank.cc to avoid service interruption. Verify now keep on using PBB services.

RM0 Credit Cash out RM3,000 form card ending no 7102 successful on 01 DEC. Information system sending. Call PBB 1800-81-9566 for any query

Warning: Your account is marked as insecure, please click Return PAC immediately to confirm that it is safe to use. (https://pbevip.vip/)

PBe Your account is in a high-risk state PLS log in immediately and return the PAC to protect your account security https://www.pbebanks.top

PBe Warning: Phishing URLs are frequent recently, PLS log in immediately to strengthen account security. 2Mar21 13:14 https://se1.pbevip.top/

PB e Your account is in a high-risk by the system, PLS re-verify your account https://pbbanks.red/ <security reminder is normal>

RM0 PIBB: Thank you for using your card ending 1098@senQ MYR 2899, Pls call 03-56260232 now, if you didn’t use it

RM0 PBB/PIBB: Trx amt MYR2699.00  @LAZADA for card ending 5738. Call PB 1-800-81-2337 now if didn t perform.

PBB: Your account is judged as high risk by the system. PLS re-verify your account https://www.pbebanks.asia/ <security reminder is normal>

PB e Alarm Your banking Suit now is marked as insecure, PLS re-verify your account https://online-pbebank.com <security reminder is normal>

 

Public Bank Fake SMS Scam : What Happens If You Click?

Clicking on the links will often lead you to a phishing website, a fake website designed to look like a Public Bank website.

You will be asked to key in your personal information, including your Public Bank user name and password. DO NOT KEY IN YOUR INFORMATION!

But if you are free and want to help screw these scammers, key in fake information as many times as possible.

Note : These scams do not just affect Public Bank. In fact, all banks are affected :

 

Public Bank : How To Identify Fake SMS Messages

With a little help from Public Bank, let’s show you how to identify fake SMS messages.

If you spot any of these warning signs, BACK OFF and DO NOT PROCEED!

Warning Sign #1 : Grammatical Mistakes

Read the two SMS messages above, and you can easily spot numerous grammatical mistakes. A bank will never send such poorly worded messages to their customers.

Warning Sign #2 : Embedded Links

Banks will NEVER embed links (URLs) into the message. If you see embedded links, always think – SCAM SMS!

Warning Sign #3 : Wrong Links

And always check the link – www.mypbebank.cc is not the correct address for the Public Bank website (www.pbebank.com)

When you see any website with .cc links, be wary because the .CC domains are registered in the Cocos Islands – an Australian territory of only 14 km², with only about 600 inhabitants.

The same goes for generic, top level domains like .TOP, .VIP, .TOP, .RED.ASIA, etc.

Warning Sign #4 : No Personal Login Phrase / Picture

To avoid phishing attacks, banks now give you a secret response (like a picture or a phrase) to confirm that you are visiting their legitimate website.

If the website you are visiting gives you the wrong picture or secret phrase, you have been tricked into visiting a fake website designed to mimic the real bank website.

You should also remember that the bank website must show you secret picture or phrase right after you enter your login, but BEFORE you key in your password.

If you are asked to key in your password without the website displaying the secret phrase or picture, you have been tricked into visiting a fake website designed to mimic the real bank website.

 

Recommended Reading

Go Back To > Cybersecurity | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

macOS, iOS, iPadOS, Safari CVE-2021-1844 Bug : Fix It Now!

Apple just rushed out macOS Big Sur 11.2.3, iOS 14.4.1, iPadOS 14.4.1 and Safari 14.0.3 to patch a critical security bug.

Find out what they fix, and why you need to update your MacBook, iPhone and iPad right away!

 

Apple Rushes Out macOS, iOS, iPadOS, Safari Critical Bug Fixes!

Released on 8 March 2021, macOS Big Sur 11.2.3 patches only one bug, which may mislead users into thinking that it’s not very important.

WebKit

Available for: macOS Big Sur

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: A memory corruption issue was addressed with improved validation.

CVE-2021-1844: Clément Lecigne of Google’s Threat Analysis Group, Alison Huffman of Microsoft Browser Vulnerability Research

On the same day, Apple also released iOS 14.4.1 and iPadOS 14.4.1 – both patching the same CVE-2021-1844 vulnerability.

WebKit

Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: A memory corruption issue was addressed with improved validation.

CVE-2021-1844: Clément Lecigne of Google’s Threat Analysis Group, Alison Huffman of Microsoft Browser Vulnerability Research

Apple also released Safari 14.0.3, which patches the same vulnerability for macOS Catalina and macOS Mojave :

WebKit

Available for: macOS Catalina and macOS Mojave

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: A memory corruption issue was addressed with improved validation.

CVE-2021-1844: Clément Lecigne of Google’s Threat Analysis Group, Alison Huffman of Microsoft Browser Vulnerability Research

 

Why Install These macOS, iOS, iPadOS, Safari Bug Fixes ASAP?

While they appear to only patch WebKit in macOS Big Sur, iOS, iPadOS and Safari, they are CRITICAL bug fixes that you need to install right away.

They patch the new CVE-2021-1844 vulnerability, which was discovered by Clément Lecigne of Google’s Threat Analysis Group and Alison Huffman of Microsoft Browser Vulnerability Research.

This vulnerability allows a remote attacker to trigger a buffer overflow when the victim opens a specially-crafted web page, allowing the attacker to execute arbitrary code on the target system.

It is not known if this vulnerability has been exploited yet, but it is critical to install the new updates to prevent that from happening.

 

Recommended Reading

Go Back To > Software | CybersecurityHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


CD PROJEKT RED Hack : Source Codes + Docs Stolen!

CD PROJEKT RED just had their source codes and internal documents stolen in a MAJOR HACK, and they may all end up being leaked!

 

CD PROJEKT RED Hack : Source Codes Stolen, Servers Encrypted!

On 9 February 2021, CD PROJEKT RED announced that their data – including source codes and internal documents – were stolen in a hack, and could possibly be leaked.

Their servers were also encrypted in a secondary ransomware attack by the same hackers, but they had backups of the encrypted data.

CD PROJEKT RED publicly ruled out negotiating with the hackers, or giving in to their demands.

This would likely mean that their source codes and internal documents will eventually be released publicly by the hackers.

The only silver lining – CD PROJEKT RED noted that they do not have any evidence that the personal data of their employees were accessed or stolen.

 

CD PROJEKT RED Hack : The Hackers’ Threats

According to the ransom note left on their servers, the hackers stole :

  • FULL source codes for Cyberpunk 2077, Witcher 3, GWENT and the unreleased version of Witcher 3.
  • ALL of their internal documents on accounting, administration, legal, HR, investor relations and more

They also encrypted all of their CD PROJEKT RED’s servers, but acknowledged that they would most likely recover the data from their backups.

The hackers are giving the CD PROJEKT RED team 48 hours to contact them to negotiate.

If there is no agreement, they threaten to sell or leak the source codes, and release their internal documents to the media.

They claim that the internal documents will make CD PROJEKT RED look bad, causing their stock prices to fall and their investors will lose trust in them.

 

CD PROJEKT RED : Official Statement On Hack

This is the official statement by CD PROJEKT RED on the hack :

Yesterday we discovered that we have become a victim of a targeted cyber attack, due to which some of our internal systems have been compromised.

An unidentified actor gained unauthorized access to our internal network, collected certain data belonging to CD PROJEKT capital group, and left a ransom note the content of which we release to the public. Although some devices in our network have been encrypted, our backups remain intact. We have already secured our IT infrastructure and begun restoring the data.

We will not give in to the demands nor negotiate with the factor, being aware that this may eventually lead to the release of the compromised data. We are taking necessary steps to mitigate the consequences of such a release, in particular by approaching any parties that may be affected due to the breach.

We are still investigating the incident, however at this t time we can confirm that – to the best of our knowledge – the compromised systems did not contain any personal data of our players or users of our services.

We have already approached the relevant authorities, including law enforcement and the President of the Personal Data Protection Office, as well as IT forensic specialists, and we will closely cooperate with them in order to fully investigate the incident.

 

Recommended Reading

Go Back To > Cybersecurity | Games | SoftwareHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Fact Check : Dr Noor Hisham Tendered His Resignation?

A WhatsApp message has gone viral, claiming that Dr Noor Hisham has tendered his resignation!

Take a look at the WhatsApp message, and find out what the facts really are!

 

Viral Claim : Dr Noor Hisham Has Tendered His Resignation!

This is the WhatsApp message that has gone viral, claiming that Dr Noor Hisham has tendered his resignation!

FINALLY DR NOOR HAS PUT HIS FOOT DOWN.
THE DAILY FIGURES FOR COVID 19 ARE BACKLOG FROM LAST YEAR.\
THE REASON BEING THE PRIME MINISTER AND TWO MINISTERS ARE KEEN TO CONTINUE THE RISE TO JUSTIFY THE BLUNTED IN RUNNING THE NATION.
THEY WANT TO CONTINUE STAYING IN THEIR POSITION.
I AM NOT SURE WHY ALL THE SULTANS ARE KEEPING MUM ON THIS.

THE ACTUAL FIGURE IS LESS THAN 100 DAILY SINCE EARLY JANUARY 2021.

IT IS TIME LIKE THIS THAT EVERYONE USE THEIR COMMON SENSE WHY PASAR MALAM IS ALLOWED TO RUN FROM 4PM TO 10PM AND KINDERGARTEN HAS BEEN ON WHILE THE REST ARE ON MCO.

AFTER THE ANNOUNCEMENT EXTENSION TO 16TH FEBRUARY 2021, THE MINISTER WENT TO HIS PENTHOUSE TO HAVE A CELEBRATION. ALL 13 OF THEM DID NOT FOLLOW SOCIAL DISTANCING NOR WEAR A MASK.

WHILE A TRIP TO BUY ESSENTIALS GOODS WAS GIVEN SUMMONED.

Villagers fined for trip to Tenom to get essential supplies
TODAY ANYONE CAUGHT WILL BE FINE RM10,000 WHILE MINISTERS ARE ABOVE THE LAW.

IT IS TIME LIKE THIS THAT MALAYSIANS WISH SOMETHNG DRASTIC IS DONE TO STOP THE DOUBLE STANDARD.

It is actually a copy and paste of a MalaysiaFlipFlop blog post.

 

Dr Noor Hisham Tendered His Resignation? Nope!

The Malaysia Ministry of Health and Dr. Noor Hisham Abdullah himself has called the post fake news, denying that he tendered his resignation.

We should also point out that the MalaysiaFlipFlop post is factually wrong in a couple of instances :

Fact #1 : Only Some Cases Are From Last Year

While MalaysiaFlipFlop claims that COVID-19 daily figures are from last year, that is only true for a few cases.

On 31 January, 2021, the Director General of Health, Dr Noor Hisham Abdullah, said that the recent surge of over 5,000 daily cases was partly due to a backlog, and partly due to targeted screening at work places, and screening of high-risk groups.

Fact #2 : Over 2000 New Daily Cases Since January 2021

Since 1 January 2021, Malaysia has reported over 2,000 new cases every day, hitting a record 5728 cases on 30 January 2021.

Not once has it dropped anywhere close to “less than 100 daily” cases that MalaysiaFlipFlop suggested.

Fact #3 : MCO Was Extended To 18 February 2021

The MCO was extended to 18 February 2021, not 16 February as MalaysiaFlipFlop claimed.

Fact #4 : Fine For Breaking MCO Rules Only RM1,000

The fine for breaking MCO rules is only RM1,000 per offence, not RM10,000 as MalaysiaFlipFlop claimed.

 

Recommended Reading

Go Back To > Cybersecurity | SoftwareHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Ministry of Education Website Uses Plain Text CAPTCHA!

It is unbelievable, but the Malaysia Ministry of Education’s website uses plain text CAPTCHA that can be copied and pasted!

Take a look at this incredulous security lapse, and find out why it could put your data at risk!

 

Ministry of Education Website Uses Plain Text CAPTCHA!

The recent threat by Anonymous Malaysia to attack government websites over their lack of security appears to be well-justified.

Qusyaire Ezwan spotted an incredulous security lapse in the official Malaysia Ministry of Education website – plain text CAPTCHA!

On top of that, the code can actually be copied and pasted!

 

Ministry of Education Plain Text CAPTCHA : A Serious Cybersecurity Risk!

The CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) test is something most of us are familiar with.

It is a test that helps to identify real humans, and weed out bots, before they are allowed to access a service. This prevents bot fraud and hacking attempts.

In the Ministry of Education website, the plain text CAPTCHA was used to “secure” the retrieval of forgotten passwords for their Student Management Module.

A real CAPTCHA uses distorted images to prevent a bot from “reading” the numbers or letters, thereby ensuring that only a real human being would be able to key in the correct code.

As this screenshot shows, the CAPTCHA used in the Ministry of Education website just uses random sequences of letters and numbers in PLAIN TEXT!

This means a bot can easily copy and paste the plain text code, and bypass the CAPTCHA test.

Frankly, this doesn’t even qualify as a CAPTCHA test, because it cannot differentiate between humans and bots.

Now, the password is still sent to the registered email accounts, not to the hackers or bots. So your data is not in immediate danger.

However, this is still a SERIOUS cybersecurity risk, because a hacker can pair this design flaw with compromised email accounts.

It would allow their bots to easily and quickly make password retrieval requests for compromised email accounts, and then retrieve your Ministry of Education password.

Having access to the Student Management Module would give hackers access to a ton of information on children and their parents :

  • child : name, date of birth, telephone number, home address
  • school : location, class name, teacher’s name,
  • parent : name, occupation, workplace address, contact number, declared salary

On top of that, many people reuse their passwords, so hackers will use the password retrieved from the Ministry of Education website on other websites and online services you may use.

If you use the same password for your banking account, for example, that would expose your banking account to the hacker.

That is why CAPTCHA is important. It doesn’t prevent hacking attempts, but it greatly slows it down by blocking bots from making mass requests.

The use of plain text CAPTCHA in an official government website is a fiasco. A basic cybersecurity checklist would have prevented software vendors from using plain text CAPTCHA in government websites.

The Malaysian government needs to take the security of official websites seriously. This is a disgrace.

 

Recommended Reading

Go Back To > Cybersecurity | SoftwareHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Beware Of AirAsia X Scam On WhatsApp!

AirAsia X is warning about a scam on WhatsApp that is trying to trick people into making payments.

Please watch out for this scam, and WARN your family and friends!

 

Beware Of AirAsia X Scam On WhatsApp!

There is a new scam on WhatsApp involving AirAsia A.

Scammers pretending to be AirAsia X are sending messages on WhatsApp, asking people to make a payment into an account allegedly belonging to a credit management company.

AirAsia X announced that neither they nor their employees are involved with that scam.

Just like banks, AirAsia X will NOT engage with customers, or solicit payments through any instant messaging apps like WhatsApp.

All official AirAsia X announcements are made through the mass media, or these official channels on social media :

Twitter: www.twitter.com/airasia
Instagram: www.instagram.com/airasia
Facebook: www.facebook.com/airasia

 

Other Scams To Watch Out For

Other than this new AirAsia X scam on WhatsApp, please watch out for these scams too :

Go Back To > Cybersecurity | TravelHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Scam Alert : Toyota 80th Anniversary Celebration!

Watch out for the Toyota 80th Anniversary Celebration scam, and the fake giveaway of a Toyota Corolla!

Find out why it is a SCAM, and please alert your family and friends!

 

Scam Alert : Toyota 80th Anniversary Celebration!

This is the link that has gone viral on WhatsApp, claiming to offer you a chance to win a Toyota Corolla during the Toyota 80th Anniversary Celebration!

It’s just a scam, so we added that overlay to prevent it from being further abused.

Please DO NOT CLICK on the link, or proceed with the “contest”.

 

Why Toyota 80th Anniversary Celebration Contest Is A Scam!

For those of you who are wondering – how do you know it’s a scam, here are the facts…

Fact #1 : The Link Is Not Legitimate

If you look at the URL – the link – it goes to http://1s7wttd.nodxteh.cn.

It is obviously not a Toyota-related link, but an unrelated Chinese-registered (.cn) domain.

A real Toyota campaign would use the official Toyota website or Facebook / Twitter page, not a Chinese domain with å weird, random link.

In addition, it is not an SSL-encrypted link, which would start with https://. While not a hallmark of a scam link, legitimate websites will use SSL-encrypted links (with https, not http)

When you see such links, DO NOT CLICK on them.

Fact #2 : Toyota’s 80th Anniversary Was In 2017

Toyota was established on 28 August 1937. They celebrated their 80th anniversary in 2017, and will be 85 years old in 2022.

This is not only a scam, it’s an old scam – it probably started in 2017 and has been refreshed every few months for the last 5 years!

Here was the official 28 August 2017 tweet by the Toyota Motor Corp.

Fact #3 : Toyota Is In The Business Of Selling Cars

Toyota is in the business of SELLING CARS, not giving them away.

Why on Earth would they give away cars to celebrate their 80th anniversary? Think about that.

They are a business, not a charity! They may give you a special discount, or launch a special edition of a Toyota car, but they will NOT give anyone a free car.

Not surprisingly, they did NOT give away a single car when they celebrated their 80th anniversary in 2017!

Fact #4 : The Page Has So Many Troubling Clues

If you click on the link, you will be led to this page, claiming you will get a free gift with Toyota… and a chance to win a Toyota Corolla.

The page is full of grammatical mistakes – something an actual Toyota website would not have.

On top of that, why would Toyota give you a Corolla for answering simple questions like “Do you know Toyota?” Seriously…

And below that is a list of comments by people who claimed to have won the Toyota Corolla. Do you really believe that Toyota is giving away so many cars?

Try clicking on their names, and nothing happens. Nothing happens either if you click to Like. So where are the likes coming from?

They are all FAKE COMMENTS. If you check the code, you can see that both the comments and pictures were manually inserted.

Fact #5 : You Will Always Win The Car

You can try the contest any number of times, and you will ALWAYS win the car.

Why? Because the next step involves you sharing this with 5 groups or 20 friends on WhatsApp!

So no matter how many times you participate, you will ALWAYS win the free Toyota Corolla. Do you think that’s the case with a real contest?

This is a SCAM. DO NOT SHARE and do NOT proceed beyond this page.

Fact #6 : There Are Tons Of Similar Scams

This is not a unique scam, and it pays to understand that this is really a common online scam.

There are tons of similar “anniversary scams”, some of which I debunked earlier :

These “anniversary scams” keep cropping up because they are very lucrative for scammers.

No matter how many times they recycle the same scams, or create new variants, people keep falling for them!

So please SHARE this scam alert, and WARN your family and friends!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | AutomotiveTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!