Tag Archives: Cyberattack

Malaysia Police Denies Running Political Troll Farm!

Malaysia Police Denies Running Political Troll Farm!

The Royal Malaysia Police (PDRM) denies running a troll farm to corrupt or manipulate public discourse!

Here is what you need to know!

 

Meta Accuses Malaysia Police Of Running Political Troll Farm!

On 4 August 2022, Meta directly named the Royal Malaysia Police (PDRM) as being responsible for a troll farm designed to “corrupt or manipulate public discourse“.

Here were the key findings that the Meta team revealed about the individuals behind the PDRM troll farm :

  • They were active on Facebook, TikTok, Twitter and Instagram.
  • They posted memes in Malay, in support of the current government coalition
  • They posted claims of corruption amongst the current government coalition’s critics
  • They created Facebook Pages that posed as independent news entities, and promoted police while criticising the opposition.
  • Their posting activity were greatest during weekdays, taking breaks for lunch.
  • Their fake accounts were under-developed, and some of them used stolen profile photos.

The troll farm was initially suspected to have originated in China by researchers at Clemson University in South Caroline. But when the Meta team investigated it, they found links to the Royal Malaysia Police (PDRM).

Read more : Meta Accuses PDRM Of Running Political Troll Farm!

The Meta team also revealed that the PDRM troll farm spent about $6,000 (~RM26,750) in Facebook and Instagram ads, paid for primarily in Malaysian Ringgit.

They also shared how successful the PDRM troll farm was in garnering followers on Facebook and Instagram :

  • Facebook Pages : About 427,000 accounts
  • Facebook Groups : About 4,000 accounts
  • Instagram Accounts : About 15,000 accounts

As a result of their investigation, Meta removed 595 Facebook accounts, 180 Pages, 11 Groups and 72 Instagram accounts that were linked to this PDRM troll farm, for violating their police against “coordinated inauthentic behavior“.

What Is Inauthentic Behavior?

Inauthentic behaviour (IB) as an effort to mislead people or Facebook about about the popularity of content, the purpose of a community (i.e. Groups, Pages, Events) or the identity of the people behind it. It is primarily centered around amplifying and increasing the distribution of content, and is often (but not exclusively) financially motivated.

IB operators typically focus on quantity rather than the quality of engagement. For example, they may use large numbers of low-sophistication fake accounts to mass-post or like their content — be it commercial, social or political. They often use tactics similar to other large-scale online activities, like spam.

This behavior pattern distinguishes IB from Coordinated Inauthentic Behavior (CIB) where operators invest in mimicking human social activity as closely as possible.

 

PDRM Denies Meta Accusations Of Running Political Troll Farm!

On 6 August 2022, PDRM issued a short notice (with my English translation) stating that it takes Meta’s allegations seriously, denies them, and is currently gathering information about those allegations.

Penafian PDRM Atas Dakwaan Syarikat Meta Platforms Incorporated

Police Diraja Malaysia (PDRM) memandang serius laporan pihak syarikat Meta Platforms Incorporated yang mendakwa terdapat akaun-akaun palsu di media sosial yang “mempunyai hubungan dengan PDRM”.

PDRM menafikan dakwaan tersebut dan sedang mengampul maklumat lanjut mengenainya.

PDRM Denies Allegations By Meta Platforms Incorporated

The Royal Malaysia Police (PDRM) is taking seriously the report by Meta Platforms Incorporated which claimed that there are fake social media account “with ties to PDRM”.

PDRM denies these allegations and is gathering more information about it.

 

PDRM Troll Farm : Is That Even Legal?!

The Royal Malaysia Police (PDRM) enforces the laws of the country, including the Internet. In fact, they have a Cyber & Multimedia Criminal Investigation Unit under the Commercial Crime Investigation Department.

The PDRM works together with the National Cyber Security Agency (NACSA) to tackle cybersecurity threats, and these would include malicious influence campaigns.

All the more reason why it is both perplexing and troubling that Malaysia’s national police force has been linked to a troll farm designed to promote the current government coalition, while denigrating the opposition.

These are specifically the cybercrimes that NACSA should be looking out for, and the PDRM should be assisting them in arresting anyone in Malaysia who participated in such activities.

The PDRM will no doubt be under tremendous pressure to explain / refute Meta’s allegations.

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | BusinessTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Will Scanning RFID Bar Codes Hack Your Phone?!

Will scanning an RFID bar code cause your phone to be hacked?!

Take a look at the viral claim, and find out what the facts really are!

 

Claim : Scanning RFID Bar Codes Will Hack Your Phone!

This warning about an RFID bar code scam has gone viral on WhatsApp, and social media.

It claims that scammers are sending people RFID stickers, and asking them to scan the bar code.

Allegedly, scanning the RFID bar code will cause your phone to be hacked by these scammers!

They send the RFID to you. When you scan the bar code they hack your hp
It’s a scam

他们将 RFID 发送给您。 当您扫描条形码时,他们会入侵您
这是一个骗局

Mereka menghantar RFID kepada anda. Apabila anda mengimbas kod bar mereka menggodam anda
Ia satu penipuan ☠️👻💩😱😰

 

Truth : Scanning RFID Bar Codes Will NOT Hack Your Phone!

This is yet another example of FAKE NEWS circulating on WhatsApp and social media, and here are the reasons why…

Fact #1 : There Is No RFID Bar Code Scanning Scam

First of all – let me just say that there is no such thing as an RFID bar code scanning scam. No one can hack your phone just because you scan an RFID bar code.

The bar code is nothing more than a series of numbers, which you can readily see printed under the bar code. These numbers cannot possibly hack your phone / smartphone.

Fact #2 : RFID Bar Code Is Used To Register Sticker

The bar code visible in the clear window of the TNG RFID self-fitment kit is merely the serial number for the RFID sticker (also known as an RFID tag).

This serial number is used to register the RFID sticker, by scanning scan the bar code using the TNG eWallet mobile app.

All it does is link the RFID sticker to your TNG eWallet account, so that all toll charges are automatically deducted from that account.

Read more : TNG RFID Self-Fitment Guide : How To Do It Yourself

Fact #3 : There Are Easier + Cheaper Ways To Hack Your Phone

Truth be told – there are far easier and cheaper ways to hack your phone, than send you a free RFID sticker and ask you to scan the bar code.

These scammers will have to put in considerable expense and technical expertise into hacking the TNG eWallet app, and inserting their malware that the fake RFID number would trigger.

But why bother? If they can hack the TNG eWallet, they don’t even need to send you any fake RFID bar code to scan!

Making fake RFID stickers (tags) that look like genuine TNG RFID self-fitment kits costs money. Sending these fake kits also put them at risk, because deliveries can be traced.

There are many other ways to compromise your smartphone. There is simply no reason why scammers to waste time and money on such a convoluted scheme.

Please help us FIGHT FAKE NEWS by sharing this fact check article out, and please SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | Cybersecurity | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Canada Internet Outage Due To Software Update, Not China!

The country-wide mobile and Internet outage in Canada was due to a software update, not hacking by China!

Take a look at the viral claim, and find out what the facts really are!

 

Claim : China Responsible For Mobile + Internet Outage In Canada!

Within hours of news breaking that Canada suffered a massive Internet outage, Vancouver Times posted a story claiming that the Royal Canadian Mounted Police (RCMP) identified China as the responsible party.

Vancouver Times also claimed that the RCMP will issue arrest warrants for the hackers responsible, who are connected to the People’s Liberation Army (PLA).

Chinese state hackers are responsible for a massive internet outage that paralyzed large parts of Canada, according to the RCMP. The federal police agency is in the process of issuing arrest warrants for several people they believe are connected to the People’s Liberation Army.

The RCMP will be holding a press conference in the next few days to announce the arrest warrants, according to sources. Canadian intelligence agencies are reportedly receiving guidance from the CIA and the FBI.

On Friday a widespread network outage from Rogers left many Canadians without mobile and internet service. The outages caused significant problems for police, courthouses, passport offices and other facilities.

The outage also disrupted services across retailers, courthouses, airlines, train networks, credit card processors and police forces, pushing many to delay business transactions. Many people were seen at Starbucks, trying to use their internet service.

The mainstream media and big tech want to hide the truth. Beat them at their own game by sharing this article!

Read more : FBI + MI5 Issue Joint Warning On Chinese Spying!

 

Truth : Canada Internet Outage Due To Software Update, Not China!

This is yet another example of FAKE NEWS created by Vancouver Times to generate page views and money from gullible people.

Fact #1 : Vancouver Times Is A Fake News Website

Vancouver Times is a “content aggregator” (copy and paste) website that is known for creating fake news to generate more page views and money.

To look legitimate, they copy and paste news from legitimate news organisations. To drive traffic, they create fake news, sometimes masked as “satire”.

To give themselves a veneer of deniability, they label themselves as a “satire website” in their About Us section.

Vancouver Times is the most trusted source for satire on the West Coast. We write satirical stories about issues that affect conservatives.

Here are some of their fake news that we debunked :

Fact #2 : Outage Only Affected Rogers Communications

On Friday, July 8, 2022, Canada was hit by a massive mobile and Internet outage that hit businesses, banks, and even police emergency lines.

However, it only affected Rogers Communications, and did not affect rivals like BCE, Telus and Shaw Communications.

The outage was extensive because Rogers is Canada’s leading telecommunications provider, with about 11.3 million wireless subscribers, and 2.25 million retail Internet subscribers.

Read more : Shanghai Police Data On 1 Billion Chinese Citizens Leaked!

Fact #3 : RCMP Did Not Blame China For Mobile + Internet Outage

The Royal Canadian Mounted Police did not blame China for Rogers Communications’ mobile and Internet outage.

This was made up by Vancouver Times to trigger right-wing conspiracy theorists, to go viral and draw more page views.

Fact #4 : Rogers Did Not Blame China For Mobile + Internet Outage

Rogers Communications themselves did not blame China for their mobile and Internet outage.

Fact #5 : Canada Confirmed Outage Was Not A Cyberattack

While the reason behind the outage was still unknown, a spokesperson for Canadian Public Safety Minister Marco Mendicino confirmed to CTV News that “the outage was not due to a cyberattack“.

Fact #6 : Rogers Confirmed Outage Due To Maintenance Update

On 11 July 2022, Rogers CEO Tony Staffieri apologised for the country-wide outage of its services.

He also said that the failure was due to “a maintenance update in our core network“. The maintenance work “caused some of our routers to malfunction early Friday morning“.

Fact #7 : Prior Rogers Outage Also Due To Software Update

This wasn’t the first time Rogers Communications’ network failed so drastically.

Just 15 months earlier – Rogers and its subsidiary, Fido, experienced a nationwide cellular service outage in April 2021.

That outage was ultimately traced to “a recent Ericsson software update” that “affected a piece of equipment in the central part” of their network, leading to “intermittent congestion impacting many customers across Canada“.

Fact #8 : It Would Have Been Considered An Act Of War

China attacking Canada’s mobile and Internet network would have been considered an act of war, if it was proven.

The Canadian government would at least have issued a strong statement, if not cut diplomatic ties with China and/or enact sanctions against the Chinese government.

Fact #9 : No One Else Reported This Story

China attacking Canada’s mobile and Internet infrastructure would have been major international news, reported across the globe.

Yet not only did no mainstream media cover this incredible story, it hasn’t even been reported in the usual conspiracy theory websites!

That’s because it was a fake story created by one publication – Vancouver Times, in their attempt to go viral again for more page views and ad money.

Fact #10 : There Is No Such Thing As A Publication Ban

Vancouver Times likes to use the “media blackout” claim, to explain why you can’t find any reputable media outlet reporting on China attacking Canada’s mobile and Internet infrastructure.

That’s utter and complete bullshit. No one – not a judge, not even the Canadian government – can control the worldwide media, or prevent anyone from writing about such an incredible story.

You can also be sure that even if the mainstream media in the Canada refused to run the story, it would have been reported by foreign media outlets, websites and blogs.

Yet, not a single foreign media outlet or online website published their account of this incredible story? That’s because IT NEVER HAPPENED…

Read more : Did Ghislaine Maxwell Just Commit Suicide In Prison?!

Fact #11 : Mainstream Media + Big Tech Would Have Loved The Hype

Vancouver Times is gaslighting you about how mainstream media and Big Tech want to hide the “truth” about China attacking Canada’s infrastructure.

They would all loved such shocking news, because it would have driven tons of traffic and engagement to their websites / platforms.

In fact, that was precisely why Vancouver Times created the fake story – to drive traffic, for the ad money.

Everything that Vancouver Times publishes should be regarded as FAKE NEWS, until proven otherwise.

Please help us fight fake news websites like Vancouver Times – SHARE this fact check out, and SUPPORT our work!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact CheckCybersecurity | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

FBI + MI5 Issue Joint Warning On Chinese Spying!

The FBI and MI5 just issued a joint warning about economic spying and hacking operations by the Chinese government!

Here is what you need to know…

 

FBI + MI5 Issue Joint Warning On Chinese Spying!

On July 7, 2022, FBI Director Christopher Wray joined MI5 Director General Ken McCallum at the MI5 London headquarters to issue a joint warning about Chinese spying and cyberattacks.

Ken McCallum said that MI5 was running seven times as many investigations into China, as it had just four years ago. He also said that MI5 planned to double that to tackle the widespread attempts.

Christopher Wray, on the other hand, stressed that the FBI had substantially increased its investigations into China, and is currently managing about 2,000 problems, and opening about two counterintelligence cases every day.

The Chinese government is set on stealing your technology – whatever it is that makes your industry tick – and using it to undercut your business and dominate your market.

Maintaining a technological edge may do more to increase a company’s value than would partnering with a Chinese company to sell into that huge Chinese market, only to find the Chinese government and your partner stealing and copying your innovation.

Both McCallum and Wray alleged that the Chinese government is engaged in a “coordinated campaign” to “cheat and steal [technology] on a massive scale“.

They also stressed that China’s hacking programme dwarfs that of any other major country, and that it has a global network of intelligence operatives.

 

FBI + MI5 : China Also Preparing To Shield From Sanctions

Even more worrying is the fact that China is working to shield its economy from any future sanctions, obviously learning from how the West punished Russia for invading Ukraine.

This suggests that China is at least preparing for the possibility, if not the eventuality, of insulating its economy from potential sanctions, should it attack Taiwan.

Wray said that China is “trying to cushion themselves from harm if they do anything to draw the ire of the international community”, and that the Chinese government is pressuring Western businesses not to criticise Beijing or its policies.

He declined to say whether an invasion of Taiwan has become more likely due to these measures, but warn that Western investments in China could be similarly impacted by such a conflict.

Just as in Russia, Western investments built over years could become hostage, capital stranded. Supply chains and relationships disrupted.

Wray also shared that the Chinese government had directly interfered in a New York congressional election, because they did not want a candidate who was a critic and a former Tiananmen Square protestor to be elected.

China has for far too long counted on being everybody’s second-highest priority. They are not flying under the radar anymore.

Both Wray and McCallum said that the intention of the joint address was to “send the clearest signal” to the Chinese Communist Party (CCP), because if China decides to invade Taiwan, it would cause “one of the most horrific business disruptions the world has ever seen“.

Read more : US Mil Contractor Admits Selling Aviation Secrets To China!

 

FBI + MI5 : Examples Of Chinese Spying

McCallum shared some specific cases of Chinese spying activities that MI5 detected and thwarted.

Covert Theft

Late last year Chinese intelligence officer Shu Yenjoon was convicted in a US court on charges of economic espionage and theft of trade secrets from the US aviation sector.

Shu was active in Europe too: he’d been part of a prolific Ministry of State Security network targeting the aerospace sector.

MI5 worked with those being targeted in the UK to mitigate the risks until the FBI action could solve the problem for both of us.

Tech Transfer

Clandestine espionage methodology isn’t always necessary. Take the tale of Smith’s Harlow, a UK-based precision engineering firm. In 2017 Smith’s Harlow entered into a deal with a Chinese firm, Futures Aerospace. The first of three agreed technology transfers saw Futures pay £3m for quality control procedures and training courses.

You know how this ends: after further sharing of valuable IP, Futures abandoned the deal. Smith’s Harlow went into administration in 2020. As their Chairman put it: “They’ve taken what they wanted and now they’ve got it, they didn’t need the shell of Smith’s”.

Information Advantage

The CCP doesn’t just use intelligence officers posing as diplomats in the classic fashion. Privileged information is gathered on multiple channels, in what is sometimes referred to as the ‘thousand grains of sand’ strategy.

In Germany a retired political scientist and his wife who together ran a foreign policy think tank passed information to the Chinese intelligence services for almost ten years.

In Estonia a NATO maritime scientist was convicted for passing information to his Chinese handlers, who claimed to be working for a think tank.

Cultivating New Contacts

The deceptive use of professional networking sites is well known. Seemingly flattering approaches turn into something more insidious – and damaging.

In one example a British aviation expert received an approach online, ostensibly went through a recruitment process, and was offered an attractive employment opportunity. He travelled twice to China where he was wined and dined. He was then asked – and paid – for detailed technical information on military aircraft. The ‘company’ was actually run by Chinese intelligence officers.

Read more : China Should Worry About Russia Invading Ukraine!

 

Chinese Response To FBI + MI5 Spying Allegations

Chinese government officials naturally rejected spying allegations by the FBI and MI5.

A spokesman for the Chinese embassy in Washington, Liu Pengyu, called the accusations groundless and said that China “firmly opposes and combats all forms of cyber-attacks“, and would “never encourage, support or condone cyber-attacks“.

His statement also said that the Taiwan issue was “purely China’s internal affair” and that there was “no room for compromise or concession“. It also said that China “will strive for the prospect of peaceful reunification with utmost sincerity and efforts“, but noted that China would “reserve the option of taking all necessary measures in response to the interference of foreign forces“.

Chinese foreign ministry spokesperson Zhao Lijian did not address the claims directly, but accused the United States of being the real danger instead.

The relevant US politician has been playing up the so-called China threat to smear and attack China. Facts have fully proven that the US is the biggest threat to world peace, stability and development.

We urge this US official to have the right perspective, see China’s developments in an objective and reasonable manner and stop spreading lies and stop making irresponsible remarks.

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | EnterpriseTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Did Hackers Release Pfizer + Moderna Vaccine Death Data?!

Did hackers just crack the Pfizer and Moderna servers, and publicly released the hidden vaccine death data that they stole?!

Take a look at the viral claim, and find out what the facts really are!

 

Claim : Hackers Stole, Released Pfizer + Moderna Vaccine Death Data!

People are sharing links to articles that claim that hackers just stole and released vaccine death data from Pfizer and Moderna servers!

Here is an example, which is rather long, so feel free to skip to the next section for the facts!

GOOD NEWS!!!! Hackers broke into all the pharmaceutical companies and stold all the medial data on vaccines thank God!!!! The Great Awaking has lifted off!!! Forward this link everywhere!!!!

**Displays number of deaths and disabilities associated with each batch/lot number = indication of relative toxicity of one batch/lot compared to another
**No one currently knows the reason why some batches/lots are associated with excessive deaths, disabilities and adverse reactions (up to 50 x). Until we do know, it is best to be cautious
**[“Batch-code” = “Lot Number” = the number they write on your vaccination card.]

 

Truth : Hackers Did Not Steal / Release Pfizer + Moderna Vaccine Death Data!

This is yet another example of FAKE NEWS created and promoted by disinformation websites like Before It’s News, How Bad Is My BatchBest News Here, and here are the reasons why…

Fact #1 : Pfizer + Moderna Servers Were Not Hacked

Those websites falsely claimed that hackers broke into Pfizer and Moderna servers, and stole their (hidden) vaccine death data.

There is no evidence the Pfizer and Moderna servers were ever hacked, or had any data stolen.

Fact #2 : All Data Are Publicly Available

Despite claiming at the start that the data provided in the website was stolen from Pfizer and Moderna servers, the article ends with a statement that all of the data was really sourced from VAERS.

Data Source
• All data is sourced from VAERS, a public database of over 700,000 adverse reaction reports for Moderna, Pfizer and Janssen Covid 19 vaccines in the USA. 
Our intention is to present the VAERS data in an accessible and unadulterated form, that can be easily verified using the links below

In other words – they falsely claimed that the data was provided by hackers who broke into Pfizer and Moderna servers. The data were all from VAERS, which is publicly available.

Fact #3 : VAERS Data Cannot Be Used As Evidence

Like the British Yellow Card system, VAERS is an open reporting system that lets ANYONE from ANYWHERE file a report, without verification.

VAERS reports are not only easily faked, they are easily abused, which why the CDC explicitly warned that :

  • Reports may include incomplete, inaccurate, coincidental and unverified information.
  • The number of reports alone cannot be interpreted or used to reach conclusions about the existence, severity, frequency, or rates of problems associated with vaccines.

But anti-vaccination activists and disinformation websites LOVE to use VAERS, because they can easily manipulate the reports to create a fake narrative.

Read more : Here’s How Antivaxxers Create Fake News Using VAERS!

Fact #4 : Pfizer + Moderna Released Their Data In 2020

Both Pfizer and Moderna submitted data from their COVID-19 vaccine clinical trials to health authorities across the world, like the US FDA and EMA in Europe in November 2020.

The release of clinical trial data, which would include post-vaccination adverse events, is necessary for any health authority to approve their vaccines.

The US FDA released the briefing documents Pfizer and Moderna submitted to the Vaccines and Related Biological Products Advisory Committee (VRBPAC) in December 2020 :

Fact #5 : FDA Started Releasing Pfizer Documents In 2021

On 27 August 2021, a group that called themselves Public Health and Medical Professionals for Transparency (PHMPT) filed a Freedom of Information Act (FOIA) request with the US FDA to gain access to all of their documents related to the Pfizer COVID-19 vaccine.

The US FDA started releasing the Pfizer documents on 17 November 2021. They were then ordered by US District Judge Mark Pittman to speed up the release of those documents on 6 January 2022.

As of 2 May 2022, the US FDA had already released 238 documents related to the Pfizer COVID-19 vaccine, containing thousands of pages.

Read more : Did Pfizer Try To Hide 158K Vax Adverse Events For 75 Years?

Fact #6 : Before It’s News Is Known Fake News Website

Before It’s News is known for creating and spreading fake news – not just misinformation, but also disinformation about everything from MH17 conspiracy theories to anti-vaccination claims.

Everything posted by Before It’s News must be considered FAKE NEWS, until proven otherwise.

Please help us FIGHT FAKE NEWS by sharing this fact check article out!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Science | Fact CheckTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Scam Alert : Nespresso 2022 Mother’s Day Contest!

Please watch out for the Nespresso 2022 Mother’s Day contest scam!

Find out why it is just a SCAM, and WARN your family and friends!

 

Scam Alert : Nespresso 2022 Mother’s Day Contest!

People are now sharing the Nespresso 2022 Mother’s Day Contest scam on WhatsApp :

Nespresso 2022 Mother’s Day Contest

5,000 free coffee machines for your Mother!

 

Nespresso 2022 Mother’s Day Contest : Why This Is A Scam!

Many of us are in dire straits during this COVID-19 pandemic, having lost jobs, income or even loved ones.

Unfortunately, scammers are counting on our desperation to prey on us, using the same survey scam they have been using for years :

Unfortunately, this Nespresso contest is yet another SCAM that you should NEVER participate in!

  1. After you click on the link, you are taken to a page that looks like a genuine Nespresso contest page.
  2. You will be asked to answer three very simple questions.
    The answers are irrelevant – no matter what you answer, you are always allowed to proceed to the next step.
  3. You are then asked to share the promotion with 30 WhatsApp contacts, or 5 WhatsApp groups.
  4. Next, you will be asked to complete one of these tasks to receive the “free” Nespresso coffee machine :
    a) install an app, which is really a malware to send you advertisements, or
    b) enter your credit card details
    Needless to say – proceeding with this step will open you up to great risk of monetary loss. DO NOT PROCEED!
  5. If you install their malware, you will start receiving promotions, some of which will ask you to send an SMS to receive expensive free gifts like laptops and smartphones.
    If you proceed to send the confirmation SMS messages, you will be subscribed and billed for international premium SMS services.

So never click on such contest links, even if they were sent to you by a trusted relative or friend.

They would have certainly been fooled by the scam, so please warn them too!

 

How To Spot Scams Like The Nespresso Survey Contest!

Now, let me show you how to spot these scams next time!

If you spot any of these warning signs, DO NOT PROCEED and DO NOT SHARE!

Warning Sign #1 : Bad Grammar

Most of these scammers do not have a good command of the English language, so if you spot bad grammar, stay away.

Proper contests or events sponsored by major brands like Nespresso will have at least one PR or marketing person who will vet the text before allowing it to be posted.

Read more : Watch Out For Nestle 2022 Anniversary Phishing Scam!

Warning Sign #2 : Offering You Free Money Or Gifts

Please do NOT be naive. No one is going to give you money or free gifts just to participate in a survey!

Petronas isn’t going to give you FREE money, just because it’s their anniversary.

They are a corporation whose business is to make money, not a charity to give you free money.

Warning Sign #3 : Not Using The Real Jaya Grocer Domain

A genuine Petronas campaign would use their real domain – www.petronas.com.

Or they would run it off the official Petronas page on Facebook – www.facebook.com/petronas/.

If you see nonsensical domains like 0yjjg61.cn, 1eaf1rnbeef.top, ldxqw.bar, etc. that’s a sign of a SCAM!

Warning Sign #4 : Asking You To Forward The Offer

No brand will insist that you must share the offer with 5 groups or 20 friends on WhatsApp.

Do not click to forward their offer to your family and friends. They will not appreciate being scammed with your help!

Warning Sign #5 : Asking You To Download + Register An App

If you click through and joined the fake survey scam, you will eventually be asked to download and register for an app.

This is VERY DANGEROUS. Never agree to download and register for any unknown app from a website.

Always download your apps from an official App Store like Google Play Store (for Android smartphones) and Apple App Store (for iPhones).

Please help us fight scams like this and SHARE this article out!

And please WARN your family and friends!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | Home TechTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Scam Alert : Petronas 50th Anniversary Survey Contest!

Please watch out for the Petronas 50th Anniversary survey contest scam!

Find out why it is just a SCAM, and WARN your family and friends!

 

Petronas 50th Anniversary Survey Scam Alert!

People are now sharing the Petronas 50th Anniversary messages on WhatsApp :

Petronas 50th Anniversary!

Click to enter to participate in the survey, have a chance to win 2000 Ringgit!

 

Petronas 50th Anniversary Survey : Why This Is A Scam

Unfortunately, this is yet another survey scam, like the FamilyMart 70th Anniversary scam!

For one thing – Petronas was incorporated on 17 August 1974, so their 50th anniversary would be on 17 August 2024!

Petronas confirmed that this survey is a scam in a Facebook post :

PETRONAS has been made aware of a scam online “survey” conducted supposedly in conjunction with “PETRONAS’ 50th Anniversary”.

We wish to inform that neither PETRONAS nor any of our subsidiaries within the Group of Companies are involved in this “survey”, and we appeal to the public not to respond or take part.

I know many of us are in dire straits during this COVID-19 pandemic, having lost jobs, income or even loved ones.

Unfortunately, scammers are counting on our desperation to prey on us, using the same survey scam they have been using for years :

Now, let me show you how to spot these scams next time!

If you spot any of these warning signs, DO NOT PROCEED and DO NOT SHARE!

Warning Sign #1 : Bad Grammar

Most of these scammers do not have a good command of the English language, so if you spot bad grammar, stay away.

Proper contests or events sponsored by major brands like Petronas will have at least one PR or marketing person who will vet the text before allowing it to be posted.

Warning Sign #2 : Offering You Free Money Or Gifts

Please do NOT be naive. No one is going to give you money or free gifts just to participate in a survey!

Petronas isn’t going to give you FREE money, just because it’s their anniversary.

They are a corporation whose business is to make money, not a charity to give you free money.

Warning Sign #3 : Not Using The Real Jaya Grocer Domain

A genuine Petronas campaign would use their real domain – www.petronas.com.

Or they would run it off the official Petronas page on Facebook – www.facebook.com/petronas/.

If you see nonsensical domains like 0yjjg61.cn, 1eaf1rnbeef.top, ldxqw.bar, etc. that’s a sign of a SCAM!

Warning Sign #4 : Asking You To Forward The Offer

No brand will insist that you must share the offer with 5 groups or 20 friends on WhatsApp.

Do not click to forward their offer to your family and friends. They will not appreciate being scammed with your help!

Warning Sign #5 : Asking You To Download + Register An App

If you click through and joined the fake survey scam, you will eventually be asked to download and register for an app.

This is VERY DANGEROUS. Never agree to download and register for any unknown app from a website.

Always download your apps from an official App Store like Google Play Store (for Android smartphones) and Apple App Store (for iPhones).

Please help us fight scams like this and SHARE this article out!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > CybersecurityBusiness | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

US Homeless Setting Up Tent + Robbing People In Subway?!

Are homeless people in the US setting up tents and robbing passengers on subway trains?!

Take a look at the viral video, and find out what the facts really are!

 

Claim : US Homeless Are Setting Up Tent + Robbing People In Subway!

People are sharing a video of homeless people in the US setting up their tent in the middle of a subway train, and then a homeless man rob another subway passenger of his food.

It is being actively shared in pro-China groups, and by pro-China social media accounts, together with messages like these :

US homeless has moved into the subway. The US homeless has moved into the subway car, and is also robbing other passengers for food in the subway car. The US government should spend more time dealing with domestic problems, instead of going abroad to set fires everywhere. Really US have degenerated to such sad state very depressing 👇👇

PRC.Forces0 : #Homeless couple camp in #NYC subway, snatching food from other passengers.

Such shameful story in US.

 

Truth : US Homeless Are NOT Setting Up Tent + Robbing People In Subway!

This is yet another example of FAKE NEWS created and/or propagated by the Chinese 50 Cent Army (wumao, 五毛), and here are the reasons why…

Fact #1 : It Was A Staged Prank Video

The video was a staged comedy prank by American comedians Esteban Hashtag Tino Romero, and Smiley Hundo.

The video was originally posted by Tino Romero on his @Pundamoniums Instagram account on 12 January 2022.

Smiley Hundo also posted it on YouTube as a short video on 2 March 2022, calling it Homeless Couple Takes Man Food On NYC Train.

Fact #2 : Tino Romero Is Famous For Prank Videos

Tino Romero is famous for participating in pranks and stunts in New York City.

In July 2021, one of his videos went viral, showing him taking a dump into a NYC sanitation worker’s mop bucket!

Of course, that video was also staged – the MTA worker was Morris Cornbread, another New York City-based comedian.

That same video was also used by the Chinese 50 Cent Army as “evidence” of how far American society has fallen. It was a kind of payback for videos of Chinese citizens pooping in public that went viral years earlier.

Fact #3 : New York City Subway Is Patrolled By NYPD

The video appears to spread quickly amongst people who have never been to the United States, and are therefore unaware that the New York City subway is patrolled by the New York City Police Department (NYPD).

NYPD officers patrol the stations, and ride the trains to help prevent crime. They also make sure homeless people do not stay in the subway stations, or sleep on the train.

Therefore, it is impossible for homeless people to actually set up a tent in the middle of a subway train. NYPD officers on patrol would certainly evict them from the train.

Fact #4 : Homelessness Is A Problem Globally

While the video was staged, it is true that homelessness is a problem in the United States, and in particular, New York City which boasts some of the most expensive real estate and rental rates in the world.

But this is not an exclusively American problem. Homelessness is a global problem, affecting many countries around the world – rich and poor alike.

Ignoring wars and conflicts that displace people, here is the top 6 list of countries with the most homeless people:

  • Nigeria : 1.66%
  • Honduras : 1.24%
  • Egypt : 1.20%
  • Pakistan : 0.94%
  • Zimbabwe : 0.85%
  • Philippines : 0.42%

Instead of mocking the homeless, perhaps we should be grateful that we have a home to live in. Many people around the world don’t.

 

Why Create Fake Stories About Homeless People In US?!

With China’s aggressive foreign stance in recent years, it is not uncommon to see such fake stories being created and shared by the Chinese 50 Cent Army, and pro-China netizens.

These fake stories are being created to drown out the negative coverage of China’s controversial Belt and Road Initiative, and its aggressive moves in the South China Sea.

The Wumao have also been actively creating fake stories to support Russia’s invasion of Ukraine.

Whatever the reasons may be, it is our duty as global citizens to stop the proliferation of such fake stories.

Please share this fact check with your friends, so they know the truth!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | Travel | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Anonymous Affiliates Are Attacking Russian Space Agency!

After Anonymous declare a cyberwar against Russia, their affiliates are going after the Russian space agency, Roscosmos.

Here is what they accomplished so far!

 

Anonymous Affiliate NB65 Attacked Russian Space Agency!

On 28 February 2022, the hacking group – Anonymous Network Battalion 65′ (NB65), which hacked and released over 40,000 files from the Russian Nuclear Safety Institute.

They then turned their attention to the Russian Space Agency, claiming to shut down the WS02 Vehicle Monitoring System server at the Roscosmos Control Center on 1 March 2022.

The Russian Space Agency sure does love their satellite imaging.

Better yet they sure do love their Vehicle Monitoring System.

The WS02 was deleted, credentials were rotated and the server is shut down.

Network Battalion isn’t going to give you the IP, that would be too easy, now wouldn’t it?

Have a nice Monday fixing your spying tech. Glory to Ukraine.

We wont [sic] stop until you stop dropping bombs, killing civilians and trying to invade.

Go the fuck back to Russia.

However, Roscosmos Chief Executive, Dmitry Rogozin denied the claim, saying that “The information of these scammers and petty swindlers is not true. All our space activity control centers are operating normally.

 

Anonymous Affiliate v0g3lSec Hacked Russian Space Agency Website!

On 3 March 2022, another Anonymous affiliate, v0g3lSec, hacked a website owned by the Russian Space Agency – http://uv.ikiweb.ru/.

This appears to be the official website for the World Space Observatory-Ultraviolet (WSO-UV) telescope, also known as the Spektr-UV. It is still down as of 4 March 2022.

 

Anonymous Affiliate v0g3lSec Leaked Russian Space Agency Files!

On 4 March 2022, v0g3lSec released files that were hacked from a private service hosted by the Russian space agency.

The files apparently contained data from Luna – a joint programme between Roscosmos and the European Space Agency (ESA).

  • The leaked data consisted of 261 items, with a size of 729 gigabytes.
  • The executable files (.exe) are from 2012, with a timestamp of 2012-12-20 18:18:57.
  • Most of the documents are from 2009 to 2012, so the files are pretty old.

This suggests that the files that v0g3lSec stole were old data archived by Roscosmos. While it is a technical success, it is unlikely to have any actual effect.

 

Roscosmos Chief Threatens ISS + War

Roscosmos chief, Rogozin, suggested that sanctions against Russia could result in the destruction of the International Space Station (ISS).

If you block cooperation with us, who will save the ISS from an uncontrolled deorbit and fall into the United States or Europe?

Rogozin also said that any cyberattack on Russia’s satellites would be considered casus belli – a cause for war.

However, it is unknown how Roscosmos or Russia plans to declare or effect war against Anonymous, or its affiliates.

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Anonymous Cyberwar Against Russia : 28 February 2022

Here are the latest cyberattacks by the hacktivist group, Anonymous, in their cyberwar against Russia!

 

Anonymous Launches Cyberwar Against Russia!

On 22 February 2022, Anonymous lobbed a warning shot at both Russia and China, hacking an official Chinese website and a Russian Modbus device.

After the Russian invasion started on 24 February, Anonymous announced that they would also begin “gearing up for action” :

#Anonymous has always been against war, and against colonialism. We’ve seen how unfettered power decimates the weak, only having its own self interests in mind. We stand with the people, not the governments of the world.
Anonymous condemns the attacks on the Ukrainian people.

There are many #Anonymous accounts gearing up for action against the imperialist state of Russia, and we will be retweeting their endeavors.

The next day, Anonymous announced that they have started attacking the Russian government.

#Anonymous is currently involved in operations against the Russian Federation. Our operations are targeting the Russian government. There is an inevitability that the private sector will most likely be affected too. While this account cannot claim to speak for the whole (con)

Read more : Anonymous fires Warning Shot at China, Russia over Ukraine!

 

Anonymous Cyberwar Successes Against Russia!

Here is the latest list of cyberattacks that Anonymous successfully conducted in their cyberwar against Russian.

25 February 2022

26 February 2022

  • Anonymous took down several Russian government websites, including the Kremlin, State Duma, and Ministry of Defense.
  • Anonymous “retrieved” and leaked 200 GB of emails from Tetraedr – a Belarusian arms manufacturer, including blueprints of the SAMs (Surface-to-Air Missiles) they manufacture.

27 February 2022

  • Anonymous took down the Chechen Republic government website : chechnya.gov.ru
    Note : This came after multiple reports of Chechen soldiers being deployed to Ukraine.
  • Anonymous shut down gas supply provided by Tvingo Telecom in Russia. Tvingo Telecom is owned by Rostelecom, a Russian state owned telecommunications company.

28 February 2022

  • Anonymous took down several official Belarus government websites :
    – Belarus Ministry of Communications and Information : mpt.gov.by
    – Belarus State Authority for Military Industry : vpk.gov.by
    – Belarus Military : mil.by
  • Anonymous took down several more Russian state and state-linked websites :
    – Pension Fund of the Russian Federation : pfr.gov.ru
    – Russian Public Services portal : gosuslugi.ru
    – Kremlin website (again) : Kremlin.ru
    – Russian Federal Customs Service : customs.gov.ru
    – Russian government website : government.ru
    – Moscow city + mayor website : mos.ru
    – Tass news agency website : Tass.ru
  • The hacking group GNG – an Anonymous affiliate – hacked and leaked a Sberbank database
  • Anonymous Network Battalion 65′ (nB65) hacked and released 40,000 files from the Russian Nuclear Safety Institute.

I will keep updating this article, as and when Anonymous announces their successes against Russia.

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Is This Zelenskyy Before He Became President Of Ukraine?!

Take a look at the viral video of Volodymyr Zelenskyy before he became President of Ukraine, and find out what the facts really are!

 

Claim : This Is Zelenskyy Before He Became President Of Ukraine!

People are sharing a video allegedly of Volodymyr Zelenskyy performing on stage, before he became President of Ukraine.

The video has the overlay “The comedian before he became the Ukrainian president“, and showed him ogling the breasts of several women, while he sang.

 

Truth : This Is Not President Of Ukraine, Volodymyr Zelenskyy!

Ever since Russia invaded Ukraine, social media and WhatsApp groups have been inundated with fake news and videos involving those two countries.

This is yet another example of pro-Russia and anti-Ukraine fake news that people are intentionally / ignorantly sharing, and here are the reasons why…

Fact #1 : He Is Vasyl Humenyuk, Not Volodymyr Zelenskyy

When I first saw the video, I could immediately see that the man was not Volodymyr Zelenskyy.

Identifying the man though took some effort, but I was finally able to identify him as Vasyl Humenyuk (Facebook page).

Fact #2 : Vasyl Humenyuk Is Like Volodymyr Zelenskyy, But Not Him

Vasyl Humenyuk is a Ukrainian comedian and politician like Volodymyr Zelenskyy. In fact, he ran for the Ukrainian Parliamentary elections under the Zelenskyy’s Servant of the People party, but lost.

He was later appointed to head the Yarmolynets District State Administration by Zelenskyy in February 2020.

Except for the fact that they are white males, they don’t really look alike… but just in case, here’s a comparison of the two man.

Fact #3 : It Was A Satirical Comedy Song

Vasyl Humenyuk is a member of the Vinnytsia team in the comedy show, League of Laughter.

The video was a clip of him singing his signature song, “Maiden’s Eyes” in the 2017 League of Laughter.

The song satirises men’s obsession with breasts, calling them “maiden’s eyes” which are what men should really be looking at.

Please watch out for the surge of pro-Russia and anti-Ukraine propaganda like this video.

Help us fight fake news, by sharing this fact check out!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Checks | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Anonymous fires Warning Shot at China, Russia over Ukraine!

The hacktivist group, Anonymous, just fired a warning shot at both China and Russia over the invasion of Ukraine!

 

Anonymous fires Warning Shot at China, Russia over Ukraine!

The hacktivist group, Anonymous, just hacked a Chinese state website, and a logic controller in Russia, as a warning shot to both countries over the invasion of Ukraine.

On Tuesday, 22 February 2022, Anonymous hacked the Chinese Culture website (www.chineseculture.com.cn), replacing its content with a page showing its logo, and the Guy Fawkes mask.

The hacked Chinese Culture website was taken offline, but you can still see the hacked page through the Wayback Machine.

The hacked page includes the YouTube video – It Might Break Your Pinky Heart – the famous music video by Malaysian singer-songwriter, Namewee, that mocks the Chinese government.

Read more : Anonymous Launches Cyberwar Against Russia!

After a video about an old MIT experimental antiviral approach called DRACO (Double-stranded RNA Activated Caspase Oligomerizer), and a reference to Operation Samatha Smith, the hacked page warned Russia over its invasion of Ukraine, with a warning shot in the form of “a small hack”.

However sadly because Putin has burned the bridge and reneged the Minsk deal by prematurely recognising separatist territories as independent, instead of waiting until the conclusion of UN interim administration period and if they vote overwhelmingly for independence per that plan, Anonymous decides to make good some of its threats by conducting a small hack on a Modbus device which we intend as a warning shot.

The above Modbus device isn”t located in countries friendly to the US and Taiwan, nor in neutral countries that want nothing with these. Instead, it is in places like China or somewhere like it.

You can make stupid threats like a spoiled child, but remember that Anonymous never have restrictions that says that only homo sapiens can be part of it.

Sony learnt the hard way in 2011 that a part of Anonymous can finish what a totally different part had started!

The Modbus device was later confirmed to be a Schneider Electric Modicon M251 logic controller located in Russia.

 

Anonymous Will Formally Attack Russia Over Ukraine Invasion!

According to Taiwan News, which reached out to Anonymous, their representative said that they were previously “playing nice and not give them an excuse to start a war“, but now that missiles had been fired on Ukraine, “we are taking off the gloves altogether.

That representative also said, “Anonymous will formally attack Russian websites or devices later” in retaliation for Russia’s invasion of Ukraine.

The Anonymous threat on the Chinese Culture website ended with its signature quote in English, Russian and Chinese :

We are Anonymous
We are legion
We do not forgive
We do not forget
Expect us!
Мы анонимы
Мы легион
Мы не прощаем
мы не забываем
Ждите нас!
我们是匿名者
我们是军团
我们不原谅
我们不会忘记
期待我们

Anonymous did not explicitly say why they are targeting China over Russia’s invasion of Ukraine, but it seems obvious that they believe that China is partly responsible for Russia’s military action.

Perhaps they felt that indirect support by the Chinese, as well as their propaganda effort, gave Russia some leeway and economic support in attacking Ukraine.

Read more : Chinese Media Accidentally Leaks Ukraine Censorship Order!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Watch Out For Nestle 2022 Anniversary Phishing Scam!

Please watch out for the Nestle 2022 Anniversary phishing scam!

Find out why it is just a SCAM, and WARN your family and friends!

 

Nestle 2022 Anniversary Phishing Scam Alert!

People are now sharing the Nestle 2022 Anniversary message on WhatsApp (translated into English) :

CONGRATULATIONS!

Your family has been chosen to receive a lucky drag for the Nestle 2022 Anniversary at the Nestle office.

This contest has been approved by the Malaysian court / police, with the cooperation of Bank Negera Malaysia (BNM).

The link attached to the a website with the following instructions :

  1. Winners must keep the PIN-CEK number as evidence for winner verification and prize collection
  2. There are two ways to submit the contest form – through WhatsApp or this website.
  3. The contest form must be completed with your details. Incomplete forms will be rejected by the sponsor without notice.
  4. Every valid application will be shortlisted. There is no limit to the number of applications.
  5. First Prize Winner : RM10,500
    Second Prize Winner : RM9,300
    Third Prize Winner : RM8,500
  6. To redeem your prize, just use your WhatsApp to :
    a) Fill in the Nestle winner application number
    b) Fill in your full name and identity card number
    c) Attach a clear picture of your BANK ATM CARD – front and back
    d) Go to the nearest ATM machine, and WhatsApp the details above to +60124181128

 

Nestle 2022 Anniversary Phishing Scam : How Does It Work?

The Nestle 2022 Anniversary phishing scam is DANGEROUS. Please warn your family and friends to AVOID it.

Fact #1 : There Is No Such Nestle Giveaway!

There is no such anniversary giveaway by Nestle Malaysia. There is no reason for Nestle Malaysia to give out so much money.

They are a business, not a charity. They are in the business of selling you products, not giving you money.

Businesses do sponsor giveaway contests, but they are generally low value. Nestle Malaysia, for example, is currently giving away RM30 Shopee vouchers.

Fact #2 : Nestle Would Not Use Free Websites

Nestle is a large multinational company. It would not be using free website services like Wix.

Nestle Malaysia has its own website (https://www.nestle.com.my/) and Facebook page (https://www.facebook.com/Nestle.Malaysia) where they post official contests and promotions.

Always verify if a contest is genuine by visiting the official website / social media page.

Fact #3 : Nestle Would Never Ask For Pictures Of Your ATM Card!

Nestle, and any legitimate brand, would NEVER ask you to send them pictures of your bank ATM card!

Sending the pictures of your ATM card will allow them to clone the card, or trick bank staff into giving the scammers access to your bank account.

NEVER EVER SEND ANYONE PICTURES OF YOUR BANK ATM CARD!

Fact #4 : Nestle Would Never Ask You To Go To An ATM

No legitimate contest would require you to go to an ATM machine to receive money.

NEVER TRUST ANYONE WHO ASKS YOU TO GO TO AN ATM MACHINE.

Fact #5 : Nestle Would Never Ask For Your PIN / TAC

Nestle would never ask you for your ATM card’s PIN or any TAC number you may receive.

Giving out those details is how scammers get access to your bank account.

NEVER GIVE OUT YOUR PIN OR TAC NUMBER!

Fact #6 : This Lets Scammers Withdraw Money From Your Bank Account

I know many of us are in dire straits during this COVID-19 pandemic, having lost jobs, income or even loved ones.

Unfortunately, scammers are counting on our desperation to prey on us, using such anniversary scams.

This particular Nestle 2022 Anniversary Scam is a real danger, because it will allow scammers to gain access to your bank account and withdraw money.

Also watch out for the other anniversary scams that I have covered over the years :

Please WARN your family and friends about these scams!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | Business | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Did China Create This Amazing Female Dancing Robot?

Did China create this amazing female dancing robot for a dance show in Shanghai?

Watch the viral video for yourself, and find out what the FACTS really are!

 

Did China Create This Amazing Dancing Robot?

Here is the video that countless people have been sharing on social media and even on YouTube. It is often paired with a short explanation in (broken) English.

Can u believe that this female dancer is robot ? The dance was held in Shanghai n it lasted only 5 minutes but the queue was 4hrs n cost 499 Yuan!

It has surpassed Japan in complexity, and saw its perfect facial expressions. Send this video to everyone to watch, let us enjoy together…

 

The Truth About This Amazing Female Dancing Robot

The agility and grace of this female dancing robot, and its facial expressions, are incredible.

The less gullible would point out that it is something you would only expect from a real human being, and they would be right.

Fact #1 : That Is A WDSF Competition Video

That was actually a video clip from the 2018 World Dance Sport Federation Championship in Lithuania.

The initials WDSF (World Dance Sport Federation) can be seen, together with the recording date at the upper left corner of the video.

Fact #2 : The Dance Only Lasted A Minute

The dance in the video only lasted just over a minute, even though the accompanying fake message claimed it lasted for 5 minutes.

Fact #3 : They Are Lithuanian Dance Champions

Both dancers are very human. In fact, they are Lithuanian dance champions Ieva Zukauskaite (female), and Evaldas Sodeika (male).

Fact #4 : 499 Yuan Was Old Entry Price To Shanghai Disneyland

The fake story claimed that the ticket to watch this performance costs 499 Yuan – about US$73 / £55 / RM303. That would be ridiculously exorbitant for a short dance.

In truth, that price was “copied” from the two earlier hoaxes (here and here) about robot dancers at the Shanghai Disneyland.

Even that price was not accurate, because 499 Yuan was the cost of an entry ticket to the Shanghai Disneyland when it first opened in February 2016.

Since 6 June 2018, it has been priced at 399 Yuan (off-peak), 575 Yuan (peak) and 665 Yuan (peak holiday).

 

Why Would Someone Create This Fake Dancing Robot Story?

With China’s aggressive foreign stance in recent years, it is not uncommon to see such fake stories being created and shared.

Some believe it’s part of a concerted attempt to burnish China’s image overseas.

Others believe the many fake stories are being created to drown out the negative coverage of China’s controversial Belt and Road Initiative, and their aggressive moves in the South China Sea.

Whatever the reasons may be, it is our duty as global citizens to stop the proliferation of such fake stories.

Please share this fact check with your friends, so they know the truth!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | Photo + VideoTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Can SIM Swap Attack Empty Bank Accounts Without Warning?

Can a SIM swap attack clear out your bank accounts without warning?

Take a look at the viral warning, and find out what the facts really are!

 

Claim : SIM Swap Attack Can Empty Bank Accounts Without Warning!

This message has gone viral on social media and WhatsApp, warning about a new high tech fraud called SIM Swap Fraud that can empty bank accounts without warning.

The message includes a link to a Straits Times report about a young couple who lost $120,000 in a fake text message scam targeting OCBC Bank customers.

Your BANK Account could be Emptied without an Alert!

Dear All, Please let’s be very careful.. There is a new HIGH TECH FRAUD in town called the SIM SWAP FRAUD, and hundreds of persons are already VICTIMS.

 

Truth : SIM Swap Attack Are Real, But Don’t Work Like That

The truth is – SIM swap attacks are real and very dangerous, but they do not work like the viral message claims.

Here is what you need to know about the viral message, and SIM swap attacks.

Fact #1 : SIM Swap Attacks Are Not New

SIM swap attacks are really not that new. They have been around at least since 2015.

Fact #2 : Viral Message Is Partly Fake

The viral message is correct about the risk of SIM swap attacks, but pretty much wrong about everything else.

In fact, the method by which the SIM swap attack works is completely made up. So the viral message is really FAKE NEWS.

Fact #3 : Straits Times Article Was Not About SIM Swap

The fake news creator added a link to a Straits Time article, to mislead you.

That’s because the article isn’t about a SIM swap attack, but a phishing attack, where the victim received an SMS  with a link that took him to a fake website that “looked exactly like the OCBC login page“.

The victim then keyed in his bank login details, thus handing over control of his bank account to the scammers. He also ignored automated messages warning him that his “account was being setup on another phone“.

It had nothing to do with a SIM swap attack. It was an SMS-based phishing attack.

Fact #4 : SIM Swap Attack Generally Does Not Require Any Action

In most SIM swap attacks, scammers use your personal information, either purchased from other criminals or obtained through earlier phishing attacks or social engineering, to request for a SIM card replacement.

All that does not require any action on your part. In most cases, you only realise you’ve been hit when you lose access to your mobile number.

Fact #5 : SIM Swap Attack May Require Action In Some Cases

The Press 1 claim in the viral message is partially correct, but it only happens in a particular circumstance.

In India, scammers have tricked people by offering a free network upgrade, or to help improve signal quality on their phones :

  1. The scammer will call the victim, claiming to be from their mobile service provider.
  2. The scammer will try to get the victim to reveal his/her 20-digit SIM card number.
  3. The scammer will use the 20-digit SIM number to initiate a SIM swap with the mobile service provider.
  4. The mobile service provider will automatically send an SMS to confirm the swap.
  5. Once the victim confirms the swap, his/her SIM card will stop working.
  6. The scammer now has access to the victim’s mobile number.

Fact #6 : SIM Swap Attack Does Not Hack Your Phone

The SIM swap attack does not involve any hacking of your phone.

You only lose access to your mobile number. Your phone is not hacked.

Fact #7 : SIM Swap Attack Does Not Empty Bank Accounts

Once the scammers successfully gain control of your mobile number, they can use it to intercept one-time passwords (OTP) like TAC numbers.

This allows them to change passwords to your bank accounts, social media accounts, etc. which is why SIM swap attacks are so dangerous and damaging.

However, it does not mean your bank accounts are immediately emptied. For one thing – the scammers need to know your bank login.

That’s why SIM swap victims often have had their bank logins and passwords stolen earlier though phishing attacks. The scammers only need their mobile numbers to receive OTP / TAC numbers to authenticate the transfers.

Fact #8 : SIM Swap Attack Can Be Used To Cheat Friends Too!

Stealing money from your bank account requires extra work, so scammers who do not have your bank login details will resort to cheating your friends.

With access to your phone number, they can easily gain access to your social media accounts (Facebook, Twitter, Instagram) as well as instant messaging apps (WhatsApp, Telegram).

Once they have control, they can send messages to your friends, pretending to be you. Naturally, they will concoct some story to ask your friends for money.

The idea is to use your (now) stolen accounts to convince your friends that you genuinely need their help. The money that they transfer goes directly to the scammers, or their mules (people who rent their bank accounts to scammers).

Now that you know the facts behind the SIM swap attack or scam, please SHARE this article with your family and friends!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | MobileTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Can Hackers Use Good Morning Greetings To Hack You?

Can hackers use Good Morning videos, pictures and messages to hack your devices, and steal your data?

Find out what is happening, and what the FACTS really are!

 

Claim : Hackers Are Using Good Morning Messages To Hack You!

This post about Chinese hackers using Good Morning videos, pictures and messages to hack your devices, keeps going viral on social media and WhatsApp.

It’s a long message, so just skip to the next section for the facts!

Dear friends, please delete all welcome photos and videos in Good Morning format and the like. Read below the article to the end, which will be clear why I ask about it. From now on I will only send personally prepared greetings.

Read it all !!! Send this message urgently to as many friends as you can to stop the invasion.

Olga Nikolaevna Lawyer: Caution:

ATTENTION

For those who like to send Good Morning pictures! Good day! Good evening!

Do not send these “good” messages.

Today, Shanghai China International News sent SOS to all subscribers (this is the third reminder) that experts recommend: please do not send good morning, good night, pictures and videos,.

 

Truth : Good Morning Greetings Not Being Used To Hack You!

Many of us get spammed with Good Morning or Good Night messages every day from family and friends.

While they often clog up Facebook, Telegram and WhatsApp groups, they really do NOT allow hackers to hack your devices.

Here are the reasons why Good Morning messages are very irritating, but harmless…

Fact #1 : Shanghai China International News Does Not Exist

The news organisation that was claimed to be the source of this warning – Shanghai China International News –  does not exist!

Fact #2 : Good Morning Greetings Not Created By Hackers

Hackers (from China or anywhere else) have better things to do than to create these Good Morning pictures and videos.

They are mostly created by websites and social media influencers for people to share and attract new followers.

Fact #3 : No Fraud Involving Good Morning Messages

There has been no known fraud involving Good Morning or even Good Night messages, videos or pictures.

Certainly, half a million victims of such a scam would have made front page news. Yet there is not a single report on even one case…. because it never happened.

Fact #4 : Image-Based Malware Is Possible, But…

Digital steganography is a method by which secret messages and other data can be hidden in digital files, like a photo or a video, or even a music file.

It is also possible to embed malicious code within a Good Morning photo, but it won’t be a full-fledged malware that can execute by itself.

At most, it can be used to hide the malware payload from antivirus scanners, which is pretty clever to be honest…

Fact #5 : Image-Based Malware Requires User Action

In January 2019, cybercriminals created an online advertisement with a script that appears innocuous and would pass any malware check.

However, the image itself has an “almost white” rectangle that is recognised by the script, triggering it to redirect the user to the cybercriminals’ website.

Once there, the victim is tricked into installing a Trojan disguised as an Adobe Flash Player update.

Such a clever way to bypass malware checks, but even so, this image-based malware requires user action.

You cannot get infected by the Trojan if you practice good “Internet hygiene” by not downloading or installing anything from unknown websites.

Fact #6 : Malicious Code Executes Immediately

If you accidentally download and trigger malware, it will execute immediately. It won’t wait, as the hoax message claims.

Deleting Good Morning or Good Night photos or videos will free up storage space in your phone, but it won’t prevent any malware from executing.

There is really no reason for malware to wait before it infects your devices. Waiting will only increase the risk of detection.

Whether the malware serves to take over your device, steal your information or encrypt it for ransom, it pays to do it at the first opportunity.

Now that you know the facts, please SHARE this article with your family and friends!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | SoftwareTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Scam Alert : TnG eWallet 5th Anniversary Survey!

Please watch out for the TnG eWallet 5th Anniversary survey scam!

Find out why it is just a SCAM, and WARN your family and friends!

 

TnG eWallet 5th Anniversary Survey Scam Alert!

People are now sharing the TnG eWallet 5th Anniversary messages on WhatsApp :

Touch n’Go eWallet 5th Anniversary!

Click to enter to participate in the survey, have a chance to win 2000 Ringgit .

 

TnG eWallet 5th Anniversary Survey : Why This Is A Scam

Unfortunately, this is yet another survey scam, like the FamilyMart 70th Anniversary scam!

For one thing – the TnG eWallet was only launched in July 2017, so it would only be celebrating its 5th anniversary in July 2022!

TnG eWallet also confirmed that this survey is a scam.

I know many of us are in dire straits during this COVID-19 pandemic, having lost jobs, income or even loved ones.

Unfortunately, scammers are counting on our desperation to prey on us, using the same survey scam they have been using for years :

Now, let me show you how to spot these scams next time!

If you spot any of these warning signs, DO NOT PROCEED and DO NOT SHARE!

Warning Sign #1 : Bad Grammar

Most of these scammers do not have a good command of the English language, so if you spot bad grammar, stay away.

This scammer even got the spelling of the brand wrong! It’s Touch ‘n Go, not Touch n’Go.

Proper contests or events sponsored by major brands like TnG eWallet will have a PR or marketing person who will vet the text before allowing it to be posted.

Warning Sign #2 : Offering You Free Money Or Gifts

Please do NOT be naive. No one is going to give you money or free gifts just to participate in a survey!

Touch ‘n Go isn’t going to give you so much FREE money, just because it’s their anniversary.

They are a corporation whose business is to make money, not a charity to give you free money.

Warning Sign #3 : Not Using The Real Domain

A genuine TNG eWallet campaign would use their real domain – www.touchngo.com.my or www.tngdigital.com.my, not di47823.shop as shown in the scam post above.

Or they would run it off the official TnG eWallet page on Facebook – www.facebook.com/touchngoewallet/.

If you see nonsensical domains like childrerdg.xyz, uglyarticle.club, ldxqw.bar, etc. that’s a sign of a SCAM!

Warning Sign #4 : Asking You To Forward The Offer

No matter how many times you “try” this scam, you will ALWAYS win the RM 2000 “prize”.

If you don’t find that odd, you should know that no brand will insist that you must share the offer with 5 groups or 20 friends on WhatsApp.

Do not click to forward their offer to your family and friends. They will not appreciate being scammed with your help!

Warning Sign #5 : Asking You To Download + Register An App

If you click through and joined the fake survey scam, you may eventually be asked to download and register for an app.

That is VERY DANGEROUS. Never agree to download and register for any unknown app from a website.

Always download your apps from an official App Store like Google Play Store (for Android smartphones) and Apple App Store (for iPhones).

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | SoftwareTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Was Facebook Taken Down By 13 Year-Old Chinese Hacker?

Was Facebook taken down by a 13 year-old Chinese hacker?

Take a look at the viral claim, and find out what the FACTS really are!

 

Claim : Facebook Was Taken Down By 13 Year-Old Chinese Hacker!

On 4 October 2021, Facebook and ALL of its messaging and social media platforms went down for about six hours, including Messenger, WhatsApp and Instagram!

Several websites, as well as people on Twitter and Facebook started claiming that Facebook was taken down by a 13 year-old Chinese hacker called Sun Jisu / Sun Ji Su / Sun Jiso / Sun Ji Soo.

There are quite a number of these claims, so just SKIP to the next section for the facts!

International media claimed that “China” was behind the suspension of social media services in the world.

According to Reuters, a Chinese hacker named “Sun Jisu” is responsible for stopping the services of “Facebook”, “WhatsApp” and Instagram, and added that the Chinese hackers are only 13 years old.

The Chinese hacker “Sun Ji Su” has topped the famous search engines and Twitter platforms during the past minutes, after disabling WhatsApp, Instagram and Facebook today 2021 in all countries of the world, amid questions among activists about the details of this information.

 

Truth : Facebook Was Not Taken Down By 13 Year-Old Chinese Hacker!

The story of a 13 year-old Chinese hacker taking down Facebook is just fake news created by fake news / clickbait websites to go viral and get money through ads.

Here are the reasons why…

Fact #1 : International Media Did Not Blame China

On one blamed China for the bizarre 6-hour downtime of Facebook, WhatsApp, Instagram and Messenger.

The international media referred to cybersecurity specialists who pointed at DNS failure as the most likely cause, not a state actor like China.

Clickbait / fake news websites intentionally added that false claim to “trigger” Chinese netizens and Sinophiles to share their fake news.

Read more : US Refused WHO Investigation Of Fort Detrick For COVID-19?

Fact #2 : Reuters  + NYT Did Not Report On Any Chinese Hacker

Reuters did not report that a 13 year-old Chinese hacker called Sun Jisu was responsible for the bringing down Facebook, WhatsApp, Instagram and Messenger.

Neither did the New York Times write about a 13 year old hacker attacking Facebook.

These are complete lies that are easily verified with a quick check on the Reuters and New York Times websites.

Fact #3 : 13 Year-Old Sun Jisu / Sun Jiso Does Not Exist

There is no 13 year-old Chinese hacker called Sun Jisu / Sun Ji Su / Sun Ji So / Sun Ji Soo. He does NOT exist.

In addition, that is a Korean name, not Chinese – a mistake that a non-Asian person would make.

Fact #4 : That Was An Old Picture Of Wang Zhengyang

The fake news websites used a picture of Chinese hacking prodigy, Wang Zhengyang, speaking at the 2014 Chinese Internet Security Conference.

Wang Zhengyang was 13 year-old at that time, and would be 20 years old this year – 2021. Here are two more pictures of him speaking at that event.

Wang Zhengyang at 2014 Chinese Internet Security Conference

Fact #5 : Facebook Services Were Brought Down By Configuration Changes

Facebook services were not brought down by a hacker, but configuration changes their own engineering team initiated internally.

Facebook’s Vice-President of Infrastructure, Santosh Janardhan, confirmed that “configuration changes” on their “backbone routers” caused the 6-hour long failure.

Our engineering teams have learned that configuration changes on the backbone routers that coordinate network traffic between our data centers caused issues that interrupted this communication. This disruption to network traffic had a cascading effect on the way our data centers communicate, bringing our services to a halt.

Read more : Why Facebook, Messenger, WhatsApp, Instagram Went Down!

Fact #6 : Access Problems Were Caused By Same Servers

Facebook run their internal systems through the same servers, so they became inaccessible when those servers were taken offline.

This included security systems that controlled the fob door locks, with a New York Times reporter tweeting that Facebook staff were unable to gain access to an unspecified office using their keycards.

However, many Facebook staff are working from home due to COVID-19 precautions, so this was only a big problem for engineers trying to gain access to the Facebook data centre in Santa Clara, California.

At no time was this security issue caused by a hacker. It was due to the same servers that went offline.

Read more : Why Facebook, Messenger, WhatsApp, Instagram Went Down!

Now that you know the truth, please SHARE this fact check with your family and friends!

Also, please STOP SHARING fake stories created by fake news / clickbait websites!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | Business | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Did 13 Yr Sun Jisu Hack Facebook, WhatsApp, Instagram?

Did the 13 year-old Chinese hacker, Sun Jisu, hack Facebook, WhatsApp and Instagram, causing them to fail for more than 6 hours?

Take a look at the new viral claim, and find out what the FACTS really are!

 

Claim : 13 Year-Old Sun Jisu Hacked Facebook, WhatsApp, Instagram!

On 4 October 2021, Facebook and ALL of its messaging and social media platforms went down for about six hours, including Messenger, WhatsApp and Instagram!

Some websites and people on Twitter and Facebook started claiming that the failure was due to a 13 year-old Chinese hacker called Sun Jisu / Sun Ji Su / Sun Jiso / Sun Ji Soo.

There are quite a number of these claims, so just SKIP to the next section for the facts!

International media claimed that “China” was behind the suspension of social media services in the world.

According to Reuters, a Chinese hacker named “Sun Jisu” is responsible for stopping the services of “Facebook”, “WhatsApp” and Instagram, and added that the Chinese hackers are only 13 years old.

The Chinese hacker “Sun Ji Su” has topped the famous search engines and Twitter platforms during the past minutes, after disabling WhatsApp, Instagram and Facebook today 2021 in all countries of the world, amid questions among activists about the details of this information.

 

Truth : Sun Jisu Doesn’t Exist, Did Not Hack Facebook, WhatsApp, Instagram!

The truth is – this is just fake news created by fake news / clickbait websites to go viral and get money through ads.

Here are the reasons why…

Fact #1 : International Media Did Not Blame China

No mainstream media blamed China for the bizarre 6-hour downtime of Facebook, WhatsApp, Instagram and Messenger.

Practically all of them referred to cybersecurity specialists who pointed at DNS failure as the most likely cause, not a state actor like China.

Clickbait / fake news websites intentionally added that false claim to “trigger” Chinese netizens and Sinophiles to share their fake news.

Read more : US Refused WHO Investigation Of Fort Detrick For COVID-19?

Fact #2 : Reuters  + NYT Did Not Report On Any Chinese Hacker

Reuters did not report that a 13 year-old Chinese hacker called Sun Jisu was responsible for the bringing down Facebook, WhatsApp, Instagram and Messenger.

Neither did the New York Times write about a 13 year old hacker attacking Facebook.

These are complete lies that are easily verified with a quick check on the Reuters and New York Times websites.

Fact #3 : 13 Year-Old Sun Jisu / Sun Ji Soo Does Not Exist

There is no 13 year-old Chinese hacker called Sun Jisu / Sun Ji Su / Sun Ji So / Sun Ji Soo. He does NOT exist.

In addition, Sun Jisu / Sun Ji Soo is a Korean name, not Chinese. This is a mistake that a non-Asian person would make.

Fact #4 : That Was An Old Picture Of Wang Zhengyang

The fake news websites used a picture of Chinese hacking prodigy, Wang Zhengyang, speaking at the 2014 Chinese Internet Security Conference.

Wang Zhengyang was 13 year-old at that time, and would be 20 years old this year – 2021. Here are two more pictures of him speaking at that event.

Wang Zhengyang at 2014 Chinese Internet Security Conference

Fact #5 : Facebook Services Were Brought Down By Configuration Changes

Facebook services were not brought down by a hacker, but configuration changes their own engineering team initiated internally.

Facebook’s Vice-President of Infrastructure, Santosh Janardhan, confirmed that “configuration changes” on their “backbone routers” caused the 6-hour long failure.

Our engineering teams have learned that configuration changes on the backbone routers that coordinate network traffic between our data centers caused issues that interrupted this communication. This disruption to network traffic had a cascading effect on the way our data centers communicate, bringing our services to a halt.

He also asserted that it was a faulty configuration change, and no user data was compromised.

Our services are now back online and we’re actively working to fully return them to regular operations. We want to make clear at this time we believe the root cause of this outage was a faulty configuration change. We also have no evidence that user data was compromised as a result of this downtime.

Read more : Why Facebook, Messenger, WhatsApp, Instagram Went Down!

Fact #6 : Access Problems Were Caused By Same Servers

Facebook run their internal systems through the same servers, so they became inaccessible when those servers were taken offline.

This included security systems that controlled the fob door locks, with a New York Times reporter tweeting that Facebook staff were unable to gain access to an unspecified office using their keycards.

However, many Facebook staff are working from home due to COVID-19 precautions, so this was only a big problem for engineers trying to gain access to the Facebook data centre in Santa Clara, California.

At no time was this security issue caused by a hacker. It was due to the same servers that went offline.

Read more : Why Facebook, Messenger, WhatsApp, Instagram Went Down!

Now that you know the truth, please SHARE this fact check with your family and friends!

Also, please STOP SHARING fake stories created by fake news / clickbait websites!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | Software | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Verified : KKM + MySejahtera SMS Messages Are Legit!

Are scammers sending fake SMS messages from KKM and MySejahtera to scam you out of your money?

Take a look at the viral post, and find out what the FACTS really are!

 

Claim : KKM + MySejahtera SMS Messages Are Fake!

People have been sharing a screenshot of two SMS messages from KKM (Malaysia Ministry of Health) and MySejahtera, claiming that they are scam messages.

RM0 MySejahtera: You are COVID-19 positive. Kindly refresh your MySejahtera Profile and click to declare your close contact: https://bit.ly/3jNvOqL

RM0 KKM Anda adlh COVID19 positif & masih belum menjawab status kesihatan hari ini. Segera lengkapkan H.A.T. di MySejahtera. Rujuk https://bit.ly/2VMaWrC

This is a scam. If receive don’t click. Please inform all ur family members and friends ….NETIZEN WATCHDOG

Many also include a link to the Kuan Evening Edition video to prove that these messages are indeed fake messages used by scammers in “phishing attacks”.

 

Truth : KKM + MySejahtera SMS Messages Are Legit!

The SMS messages in the screenshot are legit, and came from KKM and MySejahtera.

The truth is that viral message is FAKE NEWS, and here are the facts…

Fact #1 : The MySejahtera SMS Message Is Legitimate

The MySejahtera SMS message in English is legitimate. It warns you that you have tested positive for COVID-19.

You are therefore required to declare your close contacts in the MySejahtera app or website.

The link – https://bit.ly/3jNvOqL – leads to the Close Contact reporting page in the MySejahtera website (https://mysejahtera.malaysia.gov.my/help/closecontact/).

Fact #2 : The KKM Telephone Number Is Genuine

On 24 September 2021, KKM confirmed that the 03-2703-3000 telephone number is genuine.

The Malaysia Ministry of Health uses that telephone number to call those identified as COVID-19 positive to fill up their Home Assessment Tool (HAT) in the MySejahtera app.

Fact #3 : The KKM SMS Message Is Legitimate

The KKM SMS message in Bahasa Malaysia is also legitimate.

It is a reminder that you did not fill in your Home Assessment Tool (HAT) in the MySejahtera app today.

Those who are under home quarantine must complete that home assessment test every day.

The Ministry of Health may issue a compound if you fail to perform the home assessment test, as required.

The link in the SMS – https://bit.ly/2VMaWrC – actually leads to a PDF infographic on the Home Assessment Tool (HAT) – https://www.infosihat.gov.my/images/media_sihat/poster/pdf/DiManakahHAT.pdf

The infographic explains who needs to perform self-monitoring using the HAT feature, and how to do it in the MySejahtera app.

Now that you know the truth, please SHARE this fact check, so your family and friends won’t be fooled by the fake news!

It is critical that everyone understands that these alerts are genuine, and take them seriously!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Here’s How Antivaxxers Create Fake News Using VAERS!

VAERS, like the British Yellow Card system, has long been used by antivaxxers to create fake news about vaccines.

Find out why VAERS is so important to doctors, and yet so easily abused by antivaxxers!

 

VAERS : What Is It?

VAERS is an acronym for the Vaccine Adverse Event Reporting System used by the US government.

Like the British Yellow Card system, it is a passive reporting system that relies on individuals to submit reports of their adverse reactions to vaccines.

This open design used by both VAERS and Yellow Card lets scientists catch very rare adverse effects that even large trials may not catch.

For example, anaphylactic reactions to the Pfizer and Moderna vaccines are so rare, they didn’t show up in their large Phase 3 trials at all. They were only identified through VAERS after mass vaccinations started.

 

Here’s How Antivaxxers Create Fake News Using VAERS!

Both the American VAERS and the British Yellow Card system suffer from the same problem – their open catch-all design lets ANYONE file a report.

Not just parents and patients, but also any Tom, Dick or Harry with nothing better to do. And you don’t even have to ever been to the United States to file a report!

This allows antivaxxers to abuse both the VAERS and Yellow Card systems to create fake news about vaccines.

Back in 2004, James Laidler famously filed an adverse reaction report into VAERS, claiming that his annual influenza vaccine turned him into the Incredible Hulk!

Incredibly, the CDC had to ask for his permission to remove the fake report. Otherwise, it would remain in the database forever!

More recently, anti-vaccination websites are using VAERS and Yellow Card reports to fabricate fake news that vaccines are killing people.

The CDC is well-aware of this problem, which is why they explicitly pointed out to everyone that :

  • Reports may include incomplete, inaccurate, coincidental and unverified information.
  • The number of reports alone cannot be interpreted or used to reach conclusions about the existence, severity, frequency, or rates of problems associated with vaccines.

So the next time you read an article claiming that VAERS or the Yellow Card system are reporting injuries and deaths from this or that vaccine, take them with a BIG, BIG PINCH of salt. None of those reports are verified.

 

VAERS : Anyone Can File A Fake Report!

To demonstrate this point, here is a FAKE report I attempted to file into VAERS, with the following information :

First Name : Donkey
Last Name : Kong
Street Address : Rolling Barrel Avenue
City : Jungle
County : Donkey
Date Of Birth : 1 January 1908
Age : 113 Years Old
Race : 1% white, 2% black, 3% Asian, 4% Latin, 90% alien

Date of Vaccination : 31 May 2021, 1:00 AM
Date of Adverse Event : 31 May 2021, 1:01 AM
Facility / Clinic Name : Jungle Clinic
Facility / Clinic Address : Jungle Clearing, Jungle

Vaccine : COVID19 (Pfizer-BioNTech)
Lot Number : 1110654
Dose Number : 6 (it actually only has 2 doses)

Description of Adverse Event(s)

I asked to be jabbed in my left arm, the doctor insisted right arm is better because right is right, no?

After the jab, I went back and on the way back, two young punks pulled up in their fancy Mercedes at the traffic light.

I challenged them to a race in my Mustang, and midway, they clipped me and sent me flying through the walls of the Grand National Bank.

As a result, I suffered two broken legs and my right arm was ripped off.

I’m absolutely confident that my driving skills were impaired by the vaccine, and it also made my right arm easy to tear off.

Medical tests and lab results

The doctors at AdventHealth Orlando have all my medical reports and my right arm.

Days hospitalised : 300
Life threatening illness : Yes
Disability or permanent damage : Yes
Congenital anomaly or birth defect : Yes

Other Vaccine : Bullshit Vaccine
Manufacturer : Google
Adverse Event From That Vaccine : My penis fell off after getting the MMR vaccine

I did not hit Submit though, because I did not want to add another fake adverse event to the holster of anti-vaccination advocates.

But take a look at the screenshots, and see just how easy it is for anyone to make a fake VAERS report. There is no need to verify any personal details, and you can do this from anywhere in the world!

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Health | Fact Check | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Jaya Grocer 20th Anniversary Scam Alert!

Please watch out for the Jaya Grocer 20th Anniversary survey scam!

Find out why it is just a SCAM, and WARN your family and friends!

 

Jaya Grocer 20th Anniversary Survey Scam Alert!

People are now sharing these Jaya Grocer 20th Anniversary messages on WhatsApp :

Jaya Grocer 20th Anniversary!

Click to enter to participate in the survey, have a chance to win $1000!

Jaya Grocer 20th Anniversary!

Through the questionnaire, you will have a chance to get 2000 Ringgit .

 

Jaya Grocer 20th Anniversary Survey : Why This Is A Scam

Unfortunately, this is yet another survey scam, like the FamilyMart 70th Anniversary scam!

For one thing – Jaya Grocer was established in 2007, with its first outlet in Jaya 33 in Petaling Jaya 2007.

So they would only be celebrating their 20th anniversary in 2027!

Jaya Grocer also confirmed that this survey is a scam.

I know many of us are in dire straits during this COVID-19 pandemic, having lost jobs, income or even loved ones.

Unfortunately, scammers are counting on our desperation to prey on us, using the same survey scam they have been using for years :

Now, let me show you how to spot these scams next time!

If you spot any of these warning signs, DO NOT PROCEED and DO NOT SHARE!

Warning Sign #1 : Bad Grammar

Most of these scammers do not have a good command of the English language, so if you spot bad grammar, stay away.

Proper contests or events sponsored by major brands like Jaya Grocer will have a PR or marketing person who will vet the text before allowing it to be posted.

Warning Sign #2 : Offering You Free Money Or Gifts

Please do NOT be naive. No one is going to give you money or free gifts just to participate in a survey!

Jaya Grocer isn’t going to give you FREE money, just because it’s their anniversary.

They are a corporation whose business is to make money, not a charity to give you free money.

Warning Sign #3 : Not Using The Real Jaya Grocer Domain

A genuine Jaya Grocer campaign would use their real domain – www.jayagrocer.com.

Or they would run it off the official Jaya Grocer page on Facebook – www.facebook.com/jayagrocer/.

If you see nonsensical domains like uglyarticle.club, ldxqw.bar, etc. that’s a sign of a SCAM!

Warning Sign #4 : Asking You To Forward The Offer

No brand will insist that you must share the offer with 5 groups or 20 friends on WhatsApp.

Do not click to forward their offer to your family and friends. They will not appreciate being scammed with your help!

Warning Sign #5 : Asking You To Download + Register An App

If you click through and joined the fake survey scam, you will eventually be asked to download and register for an app.

That is VERY DANGEROUS. Never agree to download and register for any unknown app from a website.

Always download your apps from an official App Store like Google Play Store (for Android smartphones) and Apple App Store (for iPhones).

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > CybersecurityBusiness | Tech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Did Giant Tsunami Waves Hit Second Penang Bridge?

Did giant tsunami waves hit the second Penang bridge – the Sultan Abdul Muadzam Shah Bridge?

Find out what the facts really are!

Updated @ 2021-08-22 : Updated parts of the article, and the fact check video.

Originally posted @ 2020-12-02

 

Claim : Giant Tsunami Waves Hit Second Penang Bridge!

A video claiming to show the Second Penang Bridge getting hit by giant tsunami waves, is going viral on social media… again!

Giant tsunami waves hit Penang 2nd bridge at 6.00pm yesterday!

Dramatically, a person appeared to be swept away by a giant wave, and a motorcyclist quickly fled another giant wave!

Here is my video fact check video of two examples I found so far…

 

Truth : Tsunami Waves Did NOT Hit Second Penang Bridge!

This is yet another example of fake news spreading like COVID-19 on social media.

The video is genuine, but it does NOT show giant tsunami waves hitting the Second Penang Bridge.

Fact #1 : This Bridge Is Too Small To Be Second Penang Bridge

In the main span, the Second Penang Bridge has a height clearance of 30 metres for ships to pass under. The bulk of the bridge has a much lower 6 metre clearance.

The Second Penang Bridge is also very wide – between 150 and 250 metres, with 4 car lanes and 2 motorcycle lanes.

The bridge in the video appears to be much shorter, with a 4 metre clearance; and much narrower with just 2 lanes.

Fact #2 : No Report Of Any Tsunami Affecting Penang

There have been no earthquakes nearby, or reports of any tsunami affecting Penang.

The waves appear to be approximately 12-15 metres high, and would have been big news. Yet there is no mention of it in the mainstream media. Very sus, no?

Fact #3 : It Was An Old Video

This video went viral earlier in July 2020, when it was posted as evidence of a tsunami hitting a bridge in Alaska after an earthquake there. However, that was false as well.

The earliest we could find was a December 2017 tweet by a CNBC-AWAAZ anchor, Deepali Rana, who claimed that it was a video of the Bandra-Worli Sea Link. That was also false!

Fact #4 : The Video Was Recorded On Minicoy Island

The video was recorded on 23 August 2017, showing giant waves hitting the Eastern Jetty at Minicoy Island (Maliku), in Lakshadweep, India.

It is a much smaller structure than the second Penang bridge, or the Bandar-Worli Sea Link bridge.

Here is a picture of the Eastern Embarkation Jetty, with a surfer for size comparison.

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Fact Check | TravelTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

FamilyMart 70th Anniversary Survey Scam Alert!

Please watch out for the FamilyMart 70th Anniversary survey scam!

Find out why it is just a SCAM, and WARN your family and friends!

 

FamilyMart 70th Anniversary Survey Scam Alert!

People are now sharing these FamilyMart 70th Anniversary messages on WhatsApp :

FamilyMart 70th Anniversary!

Click to enter to participate in the survey, have a chance to win $1000!

FamilyMart 70th Anniversary!

Through the questionnaire, you will have a chance to get 2000 Ringgit .

 

FamilyMart 70th Anniversary Survey : Why This Is A Scam

Unfortunately, this is yet another survey scam.

For one thing – FamilyMart was established in Sayama, Japan in September 1973 and incorporated on 1 September 1981.

So they would only be celebrating their 70th anniversary in September 2043 or September 2051!

I know many of us are in dire straits during this COVID-19 pandemic, having lost jobs, income or even loved ones.

Unfortunately, scammers are counting on our desperation to prey on us, using the same survey scam they have been using for years :

Now, let me show you how to spot these scams next time!

If you spot any of these warning signs, DO NOT PROCEED and DO NOT SHARE!

Warning Sign #1 : Bad Grammar

Most of these scammers do not have a good command of the English language, so if you spot bad grammar, stay away.

Proper contests or events sponsored by major brands like FamilyMart will have a PR or marketing person who will vet the text before allowing it to be posted.

Warning Sign #2 : Offering You Free Money Or Gifts

Please do NOT be naive. No one is going to give you money or free gifts just to participate in a survey!

FamilyMart isn’t going to give you FREE money, just because it’s their anniversary.

They are a corporation whose business is to make money, not a charity to give you free money.

Warning Sign #3 : Not Using The Real FamilyMart Domain

A genuine FamilyMart Malaysia campaign would use the real FamilyMart Malaysia domain – www.familymart.com.my.

Or they would run it off the official FamilyMart Malaysia page on Facebook – www.facebook.com/FamilyMartMY/.

If you see nonsensical domains like uglyarticle.club, ldxqw.bar, etc. that’s a sign of a SCAM!

Warning Sign #4 : Asking You To Forward The Offer

No brand will insist that you must share the offer with 5 groups or 20 friends on WhatsApp.

Do not click to forward their offer to your family and friends. They will not appreciate being scammed with your help!

Warning Sign #5 : Asking You To Download + Register An App

If you click through and joined the fake survey scam, you will eventually be asked to download and register for an app.

That is VERY DANGEROUS. Never agree to download and register for any unknown app from a website.

Always download your apps from an official App Store like Google Play Store (for Android smartphones) and Apple App Store (for iPhones).

 

Please Support My Work!

Support my work through a bank transfer /  PayPal / credit card!

Name : Adrian Wong
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)
Credit Card / Paypal : https://paypal.me/techarp

Dr. Adrian Wong has been writing about tech and science since 1997, even publishing a book with Prentice Hall called Breaking Through The BIOS Barrier (ISBN 978-0131455368) while in medical school.

He continues to devote countless hours every day writing about tech, medicine and science, in his pursuit of facts in a post-truth world.

 

Recommended Reading

Go Back To > Cybersecurity | BusinessTech ARP

 

Support Tech ARP!

Please support us by visiting our sponsors, participating in the Tech ARP Forums, or donating to our fund. Thank you!

Scam Alert : COVID-19 Relief Fund By Federal Government!

Please watch out for the COVID-19 Relief Fund by Federal Government scam!

Find out why it is just a SCAM, and WARN your family and friends!

 

Scam Alert : COVID-19 Relief Fund By Federal Government!

People are now sharing this COVID-19 RELIEF FUND message on WhatsApp :

Apply For The Covid-19 Relief Fund Provided By The Federal Government. Hurry Up, It takes few seconds to apply. Dont [sic] miss this opportunity.

Apply Here

Note : I added the Scam Alert overlay to prevent it from being further abused.

 

COVID-19 Relief Fund : Why This Is A Scam

I know many of us are in dire straits during this COVID-19 pandemic, having lost jobs, income or even loved ones. Unfortunately, scammers are counting on our desperation to prey on us.

I will now show you why this COVID-19 Relief Fund message is just another scam. Please warn your family and friends!

Fact #1 : No Global Relief Fund By Any Federal Government

When a scam tells you that “the federal government” is giving away money, you should always ask yourself – WHICH federal government???

No government in the world is giving away money to anyone across the world. Not even the three richest economies in the world – US, China and the EU – have a COVID-19 relief fund to give money away like that.

Fact #2 : The Three Questions Are A Red Herring

Most of these scams employ simple but useless questions to trick you into thinking that this is genuine. Look at the three questions this scam is asking :

  • What’s your age range?
  • How much money do you want to receive?
  • What’s your employment status?

In a real government relief programme, your eligibility status will be based on some official document – your identity card, driver’s licence, passport, etc.

No one is going to give you money simply because you answer a few questions. And NO ONE is ever going to ask you how much you want to receive!

Fact #3 : No Government Will Ask You To Invite Friends / Groups

A real government relief programme will NEVER ask you to invite friends and groups on WhatsApp, much less insist that you invite 15 friends or 5 groups before they give you money.

That’s a dead giveaway that this is a scam, and the scammers want you to help them scam other people. So NEVER invite your friends to join the scam.

Fact #4 : SNF Global Relief Initiative Is Not By Any Federal Government

To make the scam look legit, the scammers used the SNF Global Relief Initiative for the COVID-19 Pandemic graphics.

That initiative is not by any government, but by the Stavros Niarchos Foundation (SNF).

And just in case you are wondering, no, the SNF does not give away money to individuals. They only make grants to non-profit organisations and collaborative funds.

Fact #5 : The Domain Is New + Protected

If you check the domain “relief-fund.live“, you will see that it was only created on 24 March 2021.

Even more suspiciously, all contact and ownership details have been REDACTED FOR PRIVACY. That’s often a sign that the owners are worried about being sued or prosecuted.

Name: relief-fund.live
Registry Domain ID: ac787c4c5c19460696fa1bf46d133faa-DONUTS

Nameservers:
dns1.registrar-servers.com
dns2.registrar-servers.com

Registry Expiration: 2022-03-24 11:41:35 UTC
Updated: 2021-03-29 11:42:31 UTC
Created: 2021-03-24 11:41:35 UTC

Name: REDACTED FOR PRIVACY
Organization: Privacy service provided by Withheld for Privacy ehf
Email: Please query the RDDS service of the Registrar of Record identified in this output for information on how to contact the Registrant, Admin, or Tech contact of the queried domain name.
Tel: REDACTED FOR PRIVACY
Fax: REDACTED FOR PRIVACY
Mailing Address: REDACTED FOR PRIVACY Capital Region REDACTED FOR PRIVACY IS

Fact #6 : The Comments Are Completely Faked

You may notice a bunch of comments at the bottom of the scam website. They are only there to trick you into thinking that other people received the money.

Try refreshing them. They will never change, unlike a real live comment stream. The time codes will not change either.

Try clicking on the Like option. Nothing will happen. Your Like will not register.

That’s because this is a fake comment stream. It’s all hardcoded and fixed.

Now that you know that this is just another scam, please warn your family and friends.

And please remember – no one gives away money like that. Don’t fall for these scams!

 

Help Support My Work!

If you would like to support my work, you can do so via bank transfer /  PayPal / credit card.

Name : Adrian Wong

Credit Card / Paypal : https://paypal.me/techarp
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)

Thank you in advanced! ❤️

 

Recommended Reading

Go Back To > Fact Checks | Tech ARP

 

Support Tech ARP!

If you like our work, please support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Thank you!

Is There A Communist Revolution Monument In Penang?

Pictures of a Chinese Communist Revolution Monument in Penang have gone viral, with calls from netizens to TEAR IT DOWN!

Find out what’s going on, and what the facts really are!

 

Claim : DAP Created A Communist Monument In Penang!

Pictures of a Chinese Communist Revolution Monument in Penang are being shared on Facebook and social media, with messages like this (translated into English) :

DAP created a Communist monument in Penang after they took power.

Communist monument on Flag Hill in Penang.

What are you waiting for? When are you going to tear it down?

Do You Know?

In Penang, there is a World War II memorial called the Revolution Memorial.

But it’s full of Chinese letters and the figures are all dressed as Communists.

There is absolutely no information in English or Bahasa Melayu, much less Tamil.

When people say it’s racist, [you get] angry

This monument was built as soon as DAP took over Penang from Gerakan.

Here is a selection of comments that were posted with that misleading picture, showing how it instigates hate and racial tensions :

Roboh kan semuanya,, pulau Pinang ialah tanah Melayu,,jgn lupa tu,, DAP memang haprak

Demolish it all. Penang is Malay soil. Don’t forget that. DAP is useless.

Say no to komunis DAP

Puak2 pengkhianat DAP..musoh melayu..musoh islam..

DAP are traitors, enemies of the Malays, enemies of Islam.

Robohkan Tugu peringatan pembunuh anak anak peribumi Melayu. kenapa di iarkan sebegitu rupa di mana anguta dan bekas angguta keselamatan kita boleh biarkan sebegitu rupa…Letupkan !

Destroy the memorial of the killers of Malay natives. Why is it being left like that? How can our security forces let this be? Blow it up!

 

Communist Revolution Monument In Penang : The Truth

The short version is this – the monument in the pictures exists, but it is neither a Communist monument, nor was it created or built by DAP.

All of the claims about it in the incendiary posts above are FALSE.

We would like to warn everyone to be careful of political fake news being shared to incite hatred and racial tensions.

Fact #1 : That Is The Penang Overseas Chinese Anti-War Memorial

The monument in the picture is the Penang Overseas Chinese Anti-War Memorial Park, also known as the Air Itam War Memorial Park.

It is NOT a Chinese Communist Revolution Monument.

There are two key monuments at this memorial park :

  • a bronze-coloured army supply truck being pushed by three men – memorialising the Nanyang transport volunteers from Malaya, who helped deliver supplies to China when they were blocked by the Japanese.
  • a 45-foot tall white obelisk that commemorates the Marco Polo Incident, that kicked off the Second Sino-Japanese War of 1937-1945.

The ashes of some 800 incomplete skeletons of Penang Chinese residents who died under Japanese occupation, and the Nanyang transport volunteers who died, are also buried under the obelisk.

The truck also has a number plate with the date 1939 on it. Communist China didn’t exist in 1939, so claims that this is a Communist monument is… idiotic.

Fact #2 : It Was Built In 1946 And Opened In 1951

Construction on the Penang Overseas Chinese Anti-War Memorial Park started in 1946, and it was officially opened in 1951.

DAP was only formed on 11 October 1965, so the claim that it was built when DAP gained power in Penang is false.

Because the People’s Republic of China was only established in 1949, the claim that this is a communist revolution monument is idiotic.

It is also extremely stupid to claim that the figures were dressed as Chinese Communists, because Communist China didn’t exist when the monument was being built!

Fact #3 : It Was Privately Funded

The original Penang Overseas Chinese Anti-War Memorial Park was funded entirely by the Penang China Relief Fund, a Penang-based private fundraising organisation.

It was officially opened at 11 AM on 11 November 1951 by Penang Chinese tycoon and philanthropist, Lim Lean Teng, who was the supervisory chairman of the organisation.

After the Penang China Relief Fund was dissolved in 1952, the Kong Min School was entrusted to maintain the memorial with an annual budget of $5,000, and an annual memorial service.

Fact #4 : It Was Upgraded For Its 60th Anniversary

The Board of Trustees of the Kong Min School decided to repair and upgrade the memorial to coincide with its 60th anniversary.

The RM 400,000 project also added a 60 foot-long wall relief showing Malayan transport volunteers on the Burma-China road, and a peace column with flying doves.

On top of private donations by various organisations and individuals, the Penang state government also chipped in.

When it was opened at precisely 11:11 AM on 11 November 2016 by Penang Chief Minister, Lim Guan Eng, politicians from both sides of the political divide attended the launch.

Therefore, the claim that no one knew about it, or that it was only something DAP would do, is categorically FALSE.

Photo Credit : The Sun Daily

Fact #5 : There Is Information In FOUR Languages

The memorial park has information in four languages – English, Bahasa Melayu, Chinese and Japanese.

Here is the information panel in English and Bahasa Melayu, proving that the claim there is no information in both languages are FALSE.

 

Help Support My Work!

If you would like to support my work, you can do so via bank transfer /  PayPal / credit card.

Name : Adrian Wong

Credit Card / Paypal : https://paypal.me/techarp
Bank Transfer : CIMB 7064555917 (Swift Code : CIBBMYKL)

Thank you in advanced! ❤️

 

Recommended Reading

Go Back To > Fact CheckHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Scam Alert : CIMB Customers Hit By Fake SMS Messages!

Scammers continue to target CIMB customers, using many different kinds of fake SMS messages.

Do NOT click or call if you receive any of these fake SMS messages!

And please warn your family and friends!

 

Scam Alert : CIMB Customers Hit By Fake SMS Messages!

Whether you are a CIMB Bank customer or not, you may receive one of these alarming SMS messages :

RM 0.00 CIMB: Confidential!

Dear CIMB users, your account will TERMINATED on 24/12/20. Verify via http://www.cimbclickikm.cc to keep on using CIMB Clicks services.

Please make verification within 24hours to avoid service interruption.

RM0 CIMB: Instant Transfer RM4998.78 to CHAY LEE FEN/HONG LEONG on 23-Dec-2020, 13:06:35. Call the no. at the back of your card for queries.

If you receive any of these SMS messages, please DO NOT click on the link, or call the number. JUST IGNORE THEM, or delete them.

RM0.00 CIMB: MYR 2968.00 was charged on your card num 4204 at Shopee.MY. If this is not your txn, call 1800-9767 now.

Cimb Your account is judged as high risk by the system, PLS re-verify your account. cimbclicksecurity.com

Note : These scams do not just affect CIMB Bank. In fact, all banks are affected :

 

Why These CIMB SMS Messages Are Fake

Let us show you how to identify these fake CIMB SMS messages.

If you spot any of these warning signs, BACK OFF and DO NOT PROCEED!

Warning Sign #1 : Grammatical Mistakes

If you carefully read the first SMS messages above, you can easily spot numerous grammatical mistakes. A bank will never send such poorly worded messages to their customers.

However, they may copy the real SMS message from CIMB to trick you into thinking that this is a real transaction. Such fake SMS messages will have proper grammar.

Warning Sign #2 : Embedded Links

Banks will NEVER embed links (URLs) into the message. If you see embedded links, always think – SCAM SMS!

Unlike the Public Bank SMS scam, they used a copy of the real SMS message to trick you into clicking the URL in the first message.

Warning Sign #3 : Wrong Links

And always check the link – www.cimbclickikm.cc and cimbclicksecurity.com are not the correct addresses for the CIMB Bank websites (www.cimbclicks.com.my or www.cimb.com.my).

The best policy is to manually key in the bank website address. NEVER click on any link in an SMS, even if it looks legit.

When you see any website with .cc links, be wary because the .CC domains are registered in the Cocos (Keeling) Islands – an Australian territory of only 14 km², with only about 600 inhabitants.

Warning Sign #4 : No Personal Login Phrase / Picture

To avoid phishing attacks, banks now give you a secret response (like a picture or a phrase) to confirm that you are visiting their legitimate website.

If the website you are visiting gives you the wrong picture or secret phrase, you have been tricked into visiting a fake website designed to mimic the real bank website.

You should also remember that the bank website must show you secret picture or phrase right after you enter your login, but BEFORE you key in your password.

If you are asked to key in your password without the website displaying the secret phrase or picture, you have been tricked into visiting a fake website designed to mimic the real bank website.

 

CIMB Advice To Protect Against Fake SMS / Email Scams

Here is a list of DOs and DON’Ts to protect yourself against fake SMS / email scams.

Please DO follow these good practices

  1. Pay attention to your transaction alerts and check your account activities regularly. In case of any unusual activity, please contact us immediately.
  2. If you wish to contact us, ONLY call the number on the back of your card or refer to CIMB website “Contact Us” page.
  3. Always check the URL of the website that you are making purchases from. Ensure  the “lock” icon or “https” appears on the website’s address bar.
  4. Always find a reputable seller on online marketplaces by searching for reviews from other customers to know their experience.
  5. To access CIMB Clicks, type the entire URL as follows: www.cimbclicks.com.my
  6. Always remember to log out once you have completed your banking transactions.

Please DO NOT follow these bad practices

  1. Don’t panic and give personal information to fraudsters impersonating representatives of government agencies etc. even if they deploy fear tactics. Immediately call the number on the back of your card to verify with CIMB.
  2. Never apply for personal financing through unverified links or individuals promising a lower rate. CIMB does not impose any application charges for personal financing applications.
  3. Never take instructions from anyone to change the mobile number in CIMB records to any number other than your own mobile number.
  4. When transacting online, never continue with a purchase if you have any doubts if the seller is not genuine.
  5. Never share details such as your card number / User ID / PIN / password / TAC  with anyone or key them in in any website other than CIMB Clicks.
    (Note: CIMB will never ask for  your ‘User ID’, ‘Password’ or ‘TAC’ under any circumstances outside of CIMB Clicks).
  6. Do not click on links or open email attachments from unknown / unreliable senders / sources.
    (Note: Emails from CIMB will always end with @cimb.com such as cimb.marketing@cimb.com

 

Recommended Reading

Go Back To > Cybersecurity | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Scam Warning : Public Bank Customers Hit By Fake SMS!

Scammers continue to target Public Bank customers, using many different kinds of fake SMS messages.

Do NOT click or call if you receive any of these fake SMS messages!

 

Public Bank : Fake SMS Scam Warning! Do NOT Click / Call!

Whether you are a Public Bank customer or not, you may receive one of these alarming SMS messages.

Please DO NOT click on the link, or call the number. JUST IGNORE THEM, or delete them.

The safest thing to do is NEVER CLICK ON A LINK in any SMS. If you need to log into your bank account, key in the website address manually.

RM0 PBB/PIBB: Your PBB account will TERMINATED on 02Dec20 01:30:00 AM. Please make verification via http://www.mypbebank.cc to avoid service interruption. Verify now keep on using PBB services.

RM0 Credit Cash out RM3,000 form card ending no 7102 successful on 01 DEC. Information system sending. Call PBB 1800-81-9566 for any query

Warning: Your account is marked as insecure, please click Return PAC immediately to confirm that it is safe to use. (https://pbevip.vip/)

PBe Your account is in a high-risk state PLS log in immediately and return the PAC to protect your account security https://www.pbebanks.top

PBe Warning: Phishing URLs are frequent recently, PLS log in immediately to strengthen account security. 2Mar21 13:14 https://se1.pbevip.top/

PB e Your account is in a high-risk by the system, PLS re-verify your account https://pbbanks.red/ <security reminder is normal>

RM0 PIBB: Thank you for using your card ending 1098@senQ MYR 2899, Pls call 03-56260232 now, if you didn’t use it

RM0 PBB/PIBB: Trx amt MYR2699.00  @LAZADA for card ending 5738. Call PB 1-800-81-2337 now if didn t perform.

PBB: Your account is judged as high risk by the system. PLS re-verify your account https://www.pbebanks.asia/ <security reminder is normal>

PB e Alarm Your banking Suit now is marked as insecure, PLS re-verify your account https://online-pbebank.com <security reminder is normal>

 

Public Bank Fake SMS Scam : What Happens If You Click?

Clicking on the links will often lead you to a phishing website, a fake website designed to look like a Public Bank website.

You will be asked to key in your personal information, including your Public Bank user name and password. DO NOT KEY IN YOUR INFORMATION!

But if you are free and want to help screw these scammers, key in fake information as many times as possible.

Note : These scams do not just affect Public Bank. In fact, all banks are affected :

 

Public Bank : How To Identify Fake SMS Messages

With a little help from Public Bank, let’s show you how to identify fake SMS messages.

If you spot any of these warning signs, BACK OFF and DO NOT PROCEED!

Warning Sign #1 : Grammatical Mistakes

Read the two SMS messages above, and you can easily spot numerous grammatical mistakes. A bank will never send such poorly worded messages to their customers.

Warning Sign #2 : Embedded Links

Banks will NEVER embed links (URLs) into the message. If you see embedded links, always think – SCAM SMS!

Warning Sign #3 : Wrong Links

And always check the link – www.mypbebank.cc is not the correct address for the Public Bank website (www.pbebank.com)

When you see any website with .cc links, be wary because the .CC domains are registered in the Cocos Islands – an Australian territory of only 14 km², with only about 600 inhabitants.

The same goes for generic, top level domains like .TOP, .VIP, .TOP, .RED.ASIA, etc.

Warning Sign #4 : No Personal Login Phrase / Picture

To avoid phishing attacks, banks now give you a secret response (like a picture or a phrase) to confirm that you are visiting their legitimate website.

If the website you are visiting gives you the wrong picture or secret phrase, you have been tricked into visiting a fake website designed to mimic the real bank website.

You should also remember that the bank website must show you secret picture or phrase right after you enter your login, but BEFORE you key in your password.

If you are asked to key in your password without the website displaying the secret phrase or picture, you have been tricked into visiting a fake website designed to mimic the real bank website.

 

Recommended Reading

Go Back To > Cybersecurity | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

macOS, iOS, iPadOS, Safari CVE-2021-1844 Bug : Fix It Now!

Apple just rushed out macOS Big Sur 11.2.3, iOS 14.4.1, iPadOS 14.4.1 and Safari 14.0.3 to patch a critical security bug.

Find out what they fix, and why you need to update your MacBook, iPhone and iPad right away!

 

Apple Rushes Out macOS, iOS, iPadOS, Safari Critical Bug Fixes!

Released on 8 March 2021, macOS Big Sur 11.2.3 patches only one bug, which may mislead users into thinking that it’s not very important.

WebKit

Available for: macOS Big Sur

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: A memory corruption issue was addressed with improved validation.

CVE-2021-1844: Clément Lecigne of Google’s Threat Analysis Group, Alison Huffman of Microsoft Browser Vulnerability Research

On the same day, Apple also released iOS 14.4.1 and iPadOS 14.4.1 – both patching the same CVE-2021-1844 vulnerability.

WebKit

Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: A memory corruption issue was addressed with improved validation.

CVE-2021-1844: Clément Lecigne of Google’s Threat Analysis Group, Alison Huffman of Microsoft Browser Vulnerability Research

Apple also released Safari 14.0.3, which patches the same vulnerability for macOS Catalina and macOS Mojave :

WebKit

Available for: macOS Catalina and macOS Mojave

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: A memory corruption issue was addressed with improved validation.

CVE-2021-1844: Clément Lecigne of Google’s Threat Analysis Group, Alison Huffman of Microsoft Browser Vulnerability Research

 

Why Install These macOS, iOS, iPadOS, Safari Bug Fixes ASAP?

While they appear to only patch WebKit in macOS Big Sur, iOS, iPadOS and Safari, they are CRITICAL bug fixes that you need to install right away.

They patch the new CVE-2021-1844 vulnerability, which was discovered by Clément Lecigne of Google’s Threat Analysis Group and Alison Huffman of Microsoft Browser Vulnerability Research.

This vulnerability allows a remote attacker to trigger a buffer overflow when the victim opens a specially-crafted web page, allowing the attacker to execute arbitrary code on the target system.

It is not known if this vulnerability has been exploited yet, but it is critical to install the new updates to prevent that from happening.

 

Recommended Reading

Go Back To > Software | CybersecurityHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


CD PROJEKT RED Hack : Source Codes + Docs Stolen!

CD PROJEKT RED just had their source codes and internal documents stolen in a MAJOR HACK, and they may all end up being leaked!

 

CD PROJEKT RED Hack : Source Codes Stolen, Servers Encrypted!

On 9 February 2021, CD PROJEKT RED announced that their data – including source codes and internal documents – were stolen in a hack, and could possibly be leaked.

Their servers were also encrypted in a secondary ransomware attack by the same hackers, but they had backups of the encrypted data.

CD PROJEKT RED publicly ruled out negotiating with the hackers, or giving in to their demands.

This would likely mean that their source codes and internal documents will eventually be released publicly by the hackers.

The only silver lining – CD PROJEKT RED noted that they do not have any evidence that the personal data of their employees were accessed or stolen.

 

CD PROJEKT RED Hack : The Hackers’ Threats

According to the ransom note left on their servers, the hackers stole :

  • FULL source codes for Cyberpunk 2077, Witcher 3, GWENT and the unreleased version of Witcher 3.
  • ALL of their internal documents on accounting, administration, legal, HR, investor relations and more

They also encrypted all of their CD PROJEKT RED’s servers, but acknowledged that they would most likely recover the data from their backups.

The hackers are giving the CD PROJEKT RED team 48 hours to contact them to negotiate.

If there is no agreement, they threaten to sell or leak the source codes, and release their internal documents to the media.

They claim that the internal documents will make CD PROJEKT RED look bad, causing their stock prices to fall and their investors will lose trust in them.

 

CD PROJEKT RED : Official Statement On Hack

This is the official statement by CD PROJEKT RED on the hack :

Yesterday we discovered that we have become a victim of a targeted cyber attack, due to which some of our internal systems have been compromised.

An unidentified actor gained unauthorized access to our internal network, collected certain data belonging to CD PROJEKT capital group, and left a ransom note the content of which we release to the public. Although some devices in our network have been encrypted, our backups remain intact. We have already secured our IT infrastructure and begun restoring the data.

We will not give in to the demands nor negotiate with the factor, being aware that this may eventually lead to the release of the compromised data. We are taking necessary steps to mitigate the consequences of such a release, in particular by approaching any parties that may be affected due to the breach.

We are still investigating the incident, however at this t time we can confirm that – to the best of our knowledge – the compromised systems did not contain any personal data of our players or users of our services.

We have already approached the relevant authorities, including law enforcement and the President of the Personal Data Protection Office, as well as IT forensic specialists, and we will closely cooperate with them in order to fully investigate the incident.

 

Recommended Reading

Go Back To > Cybersecurity | Games | SoftwareHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!