BREAKING There is reports Tiffany Dover is dead. She is the nurse who collapsed on live television when being interviewed about the vaccine. We can’t confirm it, we are trying to collect as much intel as possible.
INTEL WE KNOW
– She is from Tennessee
– She collapsed 15+ minutes after taking the Pfizer vaccine on live television
– Her Instagram account is tiffany_dover_ and she hasn’t posted for 5 days, she generally posts every 2-3 days
– There is social media posts about her death from people who were allegedly connected to her or her family
– There is reports of death threats against her family for sharing the info
– There is reports of censorship
– The debunkers are saying it is all false but are providing very little evidence
She will always be remembered for her bravery. She was a wonderful nurse. #nurse #bravery #covid_19 #tiffanydover #inmemoryof #hospital #alwaysremember
It gained 1650 followers before Instagram finally shut it down. While it was up, antivaxxers used it to promote the claim that she truly did die after being vaccinated with the Pfizer-BioNTech COVID-19 vaccine.
How To Help Tiffany Dover With These Fake Death Claims
Creating and sharing fake death claims about Tiffany Dover isn’t about “having an open mind” or “just investigating the truth” or “exploring the possibilities“.
This is literally cyberbullying!
And it doesn’t even stop with fake death claims. People are also hounding her family and friends, calling them fake or crisis actors.
Help stop this cyberbullying of Tiffany Dover, her family and her friends, by :
sharing such fact check articles, including this and this.
telling the truth to those who shared with you those fake claims
sharing the fact check links as comments on those fake social media posts
DO NOT SHARE those fake social media posts
Why Tiffany Dover Death Claims Are ALL FAKE!
Fact #1 : Tiffany Dover Is Alive And Well!
According to the NewsChannel 9 ABC crew who recorded the whole event on 17 December 2020, Tiffany Dover quickly recovered, and within minutes, was able to get up and speak with them again.
While antivaxxers are claiming that she subsequently died, those are complete lies. She did NOT die.
Her hospital – CHI Memorial – posted this tweet two days later, confirming that she is well, asking that people give her and her family privacy.
UPDATE: Nurse Tiffany Dover appreciates the concern shown for her. She is home and doing well. She asks for privacy for her and her family.
COVID 19 -TEST A nurse in Alabama dies directly on the air after taking the Pfizer vaccine for Corona This is clear evidence of the danger of the vaccine, including the toxins and animal genes .. LOOK AT VEDIO CLIP!
Always remember to log out once you have completed your banking transactions.
Please DO NOT follow these bad practices
Don’t panic and give personal information to fraudsters impersonating representatives of government agencies etc. even if they deploy fear tactics. Immediately call the number on the back of your card to verify with CIMB.
Never apply for personal financing through unverified links or individuals promising a lower rate. CIMB does not impose any application charges for personal financing applications.
Never take instructions from anyone to change the mobile number in CIMB records to any number other than your own mobile number.
When transacting online, never continue with a purchase if you have any doubts if the seller is not genuine.
Never share details such as your card number / User ID / PIN / password / TAC with anyone or key them in in any website other than CIMB Clicks. (Note: CIMB will never ask for your ‘User ID’, ‘Password’ or ‘TAC’ under any circumstances outside of CIMB Clicks).
Do not click on links or open email attachments from unknown / unreliable senders / sources. (Note: Emails from CIMB will always end with @cimb.com such as email@example.com)
Are hackers using Good Morning videos, pictures and messages to hack your devices, and steal your data?
Find out what is happening, and what the FACTS really are!
Claim : Hackers Are Using Good Morning Messages To Hack You!
This post about Chinese hackers using Good Morning videos, pictures and messages to hack your devices, has gone viral on social media and WhatsApp :
Dear friends, please delete all welcome photos and videos in Good Morning format and the like. Read below the article to the end, which will be clear why I ask about it. From now on I will only send personally prepared greetings.
Read it all !!! Send this message urgently to as many friends as you can to stop the invasion.
Olga Nikolaevna Lawyer: Caution: ATTENTION
For those who like to send Good Morning pictures! Good day! Good evening!
Do not send these “good” messages.
Today, Shanghai China International News sent SOS to all subscribers (this is the third reminder) that experts recommend: please do not send good morning, good night, pictures and videos,. Reports show that hackers in China designed the images, the video is so beautiful to hide the phishing codes inside them, when everyone sends these messages, the hackers use your devices to steal personal information, such as bank card information and data to crack the phone.
It has been reported that more than 500,000 victims of fraud have already been deceived.
If you want to greet others, write your own message to protect yourself and your family and friends.
Important! Delete all greeting messages and pictures that you have on your phone for your own safety. If someone sent you such a picture, immediately remove it from the device. Malicious code takes time to deploy, so if you act immediately, no harm will be done.
Tell all your friends about this to prevent hacking.
Greet others by writing your own words, and send only images you create. The material you create yourself is completely safe. Please understand me correctly! All have credit cards attached to their phone. Everyone has a lot of contacts in their phones. You will create a threat not only to yourself, but to all the contacts that you have on your phones, your friends and acquaintances. Take this very carefully! This is a harsh reality
ATTENTION !!! Urgent information !!!
Some people have already restricted..!
Hackers Using Good Morning Messages To Hack You : Just Another Hoax!
Many of get blasted with Good Morning or Good Night messages every day from well-meaning friends and family.
While they are literally spam that clog up Facebook, Telegram and WhatsApp groups, they really do NOT allow hackers to hack your devices.
While it would be nice to see people stop this irritating practice, here are the reasons why Good Morning messages are harmless…
Fact #1 : Shanghai China International News Does Not Exist
The news organisation, Shanghai China International News, that was stated in the hoax does not exist.
Fact #2 : No Reports On Hackers Designing Good Morning Pictures + Videos
There are no reports on hackers from China or anywhere else creating these Good Morning pictures and videos.
In fact, they are mostly created by websites and Facebook pages for people to share, and hopefully attract new followers.
Fact #3 : No Fraud Involving Good Morning Messages
There has been no fraud involving Good Morning or even Good Night messages, videos or pictures.
Certainly, half a million victims of such a scam would have made front page news. Yet there is not a single report on even one case.
Fact #4 : Image-Based Malware Is Possible, But…
Digital steganography is a method by which secret messages and other data can be hidden in digital files, like a photo or a video, or even a music file.
It is also possible to embed malicious code within a Good Morning photo, but it won’t be a full-fledged malware that can execute by itself. At most, it can be used to hide the malware payload from antivirus scanners.
In January 2019, cybercriminals created an online advertisement with a script. The script itself would appear innocuous and pass any check.
However, the image itself has an “almost white” rectangle that is recognised by the script, triggering it to redirect the user to the cybercriminals’ website.
Once there, the victim is tricked into installing a Trojan disguised as an Adobe Flash Player update.
Fact #5 : Malicious Code Executes Immediately
If you accidentally download and trigger malware, it will execute immediately. It won’t wait, as the hoax message claims.
Deleting Good Morning or Good Night photos or videos will free up storage space in your phone, but it won’t prevent any malware from executing.
Also, most malware require some sort of action to trigger their execution. Generally (but not always), just downloading a malware won’t trigger it.
Find out how Honeywell has pivoted to deliver new services and products that help critical industries tackle the COVID-19 pandemic!
How Honeywell Is Helping Industries Tackle COVID-19
Honeywell have long been a solution partner for critical industries, with over 100 years of global experience in various industries.
In an exclusive roundtable session, Norm L. Gilsdorf, President of Honeywell ASEAN, detailed how the COVID-19 pandemic has created a crisis for critical industries.
On the other hand, it offered Honeywell the opportunity to showcase their expertise in creating new solutions and products to meet the new challenges.
Honeywell Products + Services That Help Industries Tackle COVID-19
Honeywell have quickly pivoted to develop these new solutions and products to help critical industries In ASEAN countries and around the world better handle the challenges of the COVID-19 pandemic.
Honeywell UV Treatment System
The Honeywell UV Treatment System is a deep ultraviolet (UVC) sanitising system for airlines that significant reduces certain viruses and bacteria on airplane cabin surfaces.
It is roughly the size of the typical airline beverage cart, with arms that extend over the top of seats, to sweep the cabin with UVC light.
The Honeywell UV Treatment System can service an aircraft cabin in less than 10 minutes for just a few dollars per flight for midsize to large airline fleets.
Currently, several major airlines in the ASEAN region are testing this system on their aircraft.
Honeywell Healthy Building Solutions
The Honeywell Healthy Building Solutions are not new, but they go a long way to help companies protect their workforce from COVID-19.
By integrated air quality, safety and security technologies, they help to improve the health of building environments, operate more cleanly and safely, and help enforce social distancing policies.
The same technologies can also be employed in other public and commercial facilities like hospitals, airports, factories, educational institutions, etc. to enhance safety and compliance.
Honeywell Remote Industrial Solutions
The Honeywell Remote Industrial Solutions are being used by customers to handle COVID-19 related constraints and maintain business continuity, while protecting employees.
This software suite, which includes Experion Remote Operations, allow for remote management as well as work-from-home abilities for employees.
Honeywell Forge Cybersecurity Suite helps customers ensure business continuity in the face of mounting cyber threats, uncertain business conditions and supply chain disruptions.
Warehouse and logistics solutions help drive the exceptional growth of e-commerce in the ASEAN region and beyond, during the pandemic. They also support cold chain services for delivering medical products, including vaccines.
Other Honeywell Solutions That Help Against COVID-19
Other Honeywell solutions that help people and industries handle COVID-19 include :
Gas and flow sensors for ventilators, oxygen concentrators and respiratory machines;
Thermorebellion, a new temperature monitoring solution that incorporates advanced, infrared imaging technology and artificial intelligence algorithms to conduct non-invasive, preliminary screening of personnel entering facilities such as airports, hospitals and plants;
Vitaly Kamluk, Kaspersky Director of Global Research and Analysis for APAC, explores the impact of social media activities on our digital reputation, as well as those of brands and companies!
Digital Reputation : What Is It?
Digital reputation is the online version of good old fashion reputation. The only difference is that it is defined by our online behaviour and what people are saying about us, or the brand.
In short, our digital reputation is a combination of our digital footprint, and the impact it has on how other people perceive us, or the brand.
As the world becomes more connected, digital reputation is becoming more than just important – it is now critical to the future and success of any individual or corporation.
This has led to a shift in how people and brands behave online these days…
As Jesmond Chang, Head of Corporate Communications for Kaspersky APAC, shared above :
32% of social media users in APAC use anonymous accounts
50% of social media users in APAC avoid companies that are involved in a scandal, or had received negative news coverage online
40% also stopped using a company’s or brand’s products once they are embroiled in some kind of online crisis.
Kaspersky on APAC Digital Reputation Threats!
At the 6th Vitaly Kamluk, Kaspersky Director of Global Research and Analysis for APAC, shared the latest threats to digital reputation in the APAC region, which is precipitated by the COVID-19 pandemic.
“One of the most visible effect of this pandemic is how it forced everyone, from individuals to the biggest companies, to shift a lot of their activities online.
This dependence, triggered by our need to secure our physical health, also pushed us to increase our social media use, either to connect with our distant loved ones, to give support to our community, to entertain ourselves, or to get hold of products and services that we need.
Parallel to this trend is the opening of wider doors for cybercriminals to exploit”
With many employees working from home, cybercriminals have found new ways to exploit this situation :
brute force attacks on database servers increased 23% in April 2020
Malicious files planted on websites increase 8% in April 2020
Network attacks and phishing emails also rose
Kaspersky themselves reported an increase of unique malware samples from 350,000 per day pre-COVID, to 428,000 per day!
With the increased reliance on online services, including remote work and learning, e-commerce purchases and a greater adoption of e-wallets, the 2020 threat landscape appears to favour cybercriminals.
The viral infographic claiming that the PKPD for eight states and federal territories in Malaysia was just extended to 3 January 2021 is FALSE.
Take a look at what just went viral on social media, and why it is just fake news!
Claim : PKPD in Malaysia Extended To 3 January 2021?
This was the infographic that went viral on social media today, 3 December 2020. We added the FALSE overlay to prevent further abuse.
It claimed that the PKPD (Perintah Kawalan Pergerakan Diperketatkan) or EMCO (Enhanced Movement Control Order) for these eight states and federal territories in Malaysia was just extended to 3 January 2021.
PKPD In Malaysia Extended To 3 January 2021 : FAKE NEWS!
That infographic is fake and was edited from previous infographics released by the Malaysia National Security Council (MKN).
For the Doubting Thomases of the world who always ask, “How you know?”, here are the facts why…
Fact #1 : There Is No PKPD / EMCO Of Any State In Malaysia
There is no PKPD or EMCO covering an entire state or federal territory in Malaysia.
Only PKPB (Perintah Kawalan Pergerakan Bersyarat) or CMCO (Conditional Movement Control Order) exists for these seven states or federal territories :
North : Penang, Perak
East : Terengganu, Kelantan
Central : Selangor, Kuala Lumpur
South : Negeri Sembilan
Fact #2 : Labuan Is A Federal Territory
Labuan is always listed as WP Labuan in government infographics, because it is a federal territory, like Kuala Lumpur and Putrajaya.
Fact #3 : The Government Has Debunked It As Fake
The Malaysia National Security Council (MKN) has just publicly debunked the infographic as fake (with our English translation).
Dell EMC PowerProtect Cyber Recovery just received a Sheltered Harbor endorsement!
Find out what this means for financial services organisations looking for a Sheltered Harbor-certified turnkey data vault!
Dell EMC PowerProtect Cyber Recovery : Endorsed by Sheltered Harbor!
On 10 November 2020, Dell EMC PowerProtect Cyber Recovery was officially endorsed by Sheltered Harbor – the non-profit initiative to improve the stability and resiliency of the financial sector.
This is the culmination of two years of work between Dell and Sheltered Harbor teams, to develop a solution designed for financial services organisations.
If your organisation is a Sheltered Harbor participant, or eligible to be one, you can now purchase and quickly deploy the Dell EMC PowerProtect Cyber Recovery – a turnkey data vault that meets all of the stringent Sheltered Harbor criteria.
The Dell EMC PowerProtect Cyber Recovery Solution for Sheltered Harbour helps participants achieve compliance with data vaulting standards and certification, and plan for operational resilience and recovery against any cyber attack.
If your organisation is not part of the Sheltered Harbor community, you can still deploy PowerProtect Cyber Recovery to protect your data with the same stringent Sheltered Harbor standards.
Dell EMC PowerProtect Cyber Recovery : What Is It?
Dell EMC PowerProtect Cyber Recovery is an on-premise turnkey data vaulting solution that protects customers from all kinds of cyber threats.
Its CyberSense analytics and machine learning capabilities allow customers to monitor data integrity, ensuring the continued quality of their data.
It also comes with forensic tools to let customers discover, diagnose and remediate ongoing attacks.
Lazada just admitted that a data breach involving their RedMart customer database that could affect some 1.1 million customers!
Find out what happened, and what it could mean for Lazada and RedMart customers!
Lazada RedMart : What Is It?
RedMart is an online grocery platform in Singapore that was founded in August 2011.
Lazada acquired RedMart in November 2016, and started to integrate it into their platform in March 2019.
This March 2019 date is important, because that was when the RedMart database was last updated.
Lazada RedMart Data Breach : What Happened?
The Lazada RedMart database was spotted for same in an online forum, amongst many other databases stolen from other e-commerce websites.
In this screenshot, you can see that it claims to have details on 1.1 million Lazada RedMart customers :
Partial credit card information
Picture Credit : CNA
In a statement posted on 30 October 2020, Lazada confirmed the data breach involving their RedMart database.
They assert that only the old RedMart database that was “18 months out of date” when it was last updated in March 2019.
Singapore, 30 October 2020 – Lazada places great importance on protecting your personal information, and we value the trust you have placed with us. On 29 October 2020, as part of our proactive monitoring, our cybersecurity team discovered a data security incident in Singapore, involving a RedMart-only database hosted on a third-party service provider. The customer data hosted on this database is more than 18 months out of date as it was last updated in March 2019.
The customer information that was illegally accessed include the names, phone numbers, emails, addresses, encrypted passwords and partial credit card numbers of RedMart customers. We have taken immediate action to block unauthorised access to the database. This data was used on the previous RedMart app and website, which are no longer in use. Lazada customer data in Southeast Asia is not affected by this incident.
Protecting the data and privacy of our users is of utmost importance to us. Apart from reviewing and fortifying our security infrastructure, we are working very closely with the relevant authorities on this incident and remain committed to providing all necessary support to our users.
We want to be transparent about this incident with all of our customers and reassure you that we are taking it seriously.
They also set their platform to log out all Lazada users, and require them to register a new password.
They are also warning their users to be on the alert for spam mails requesting personal information.
Lazada RedMart Data Breach : What’s The Implication?
A Data Breach Is A Data Breach Is A Data Breach
Lazada may claim that the data and privacy of their users are of the utmost importance, but the data breach says otherwise.
They left a database they no longer used since March 2019 on a third-party service provider, and accessible online all this time.
Any half-decent cybersecurity specialist would have told them to take the database offline, unless it was essential to the operation of the website.
Closing The Barn Door After The Horses Have Bolted
Lazada immediately blocked unauthorised access to their RedMart database, but that’s like closing the barn door after the horses have bolted.
Once the data was stolen, all it does is prevent other attackers from stealing the data for themselves.
Lazada Migrated RedMart Users In March 2016
It seems a little disingenuous for Lazada to announce that the data was used in “the previous RedMart app and website, which are no longer in use“.
They appear to have migrated RedMart users to Lazada on 15 March 2016 using the same data that was just stolen.
Unless RedMart users changed their passwords, addresses, phone numbers, email addresses or credit card details AFTER they were migrated to the Lazada platform, they remain exposed by the data breach.
The Data Isn’t Necessarily Outdated
Most of us don’t change our logins and passwords that often. And we often reuse the same login and password combination for different websites.
So it is scant assurance that their RedMart database was last updated in March 2019, even if we take their word that it was more than 18 months out of date.
This data breach exposes all affected RedMart users to the possibility of their other accounts being breached as well.
Only Ex-RedMart Users Affected
The only saving grace we can see here is that it looks like only former RedMart users are affected by this data breach.
That means Lazada users who never registered or used the RedMart app or website are not affected.
Lazada RedMart Data Breach : What Can You Do?
If you ever registered for, or used, RedMart before their migration to the Lazada platform in March 2016, we highly recommend that you :
change your Lazada password
change the password of accounts that use the same password as your Lazada / RedMart account
do NOT click on links in emails warning you about this data breach and asking you to change your password
do NOT respond to calls or messages warning you about this data breach
do NOT respond to requests for personal information
Dr. Chong Yit Khang Medical Officer Kuala Lumpur General Hospital
Malaysia is finally forced into entering a stormy time. As the number of Covid-19 cases increases, all we can do now is to minimize the damage. Malaysia is entering the Delay Phase from the Containment Phase.
During the Containment Phase, medical staff will try to detect a confirmed case from a sea of suspected cases and isolate the patient to prevent the virus from spreading in the local population.
Our quarantine period has failed in a way. On the one hand, it is due to policy failure. On the other hand, the virus is highly contagious. Of course, the self-awareness and quality of the people play a great influence at this stage. Compliment or derogatory, let the history decides.
The government’s Movement Restriction Order falls in the Delay Phase. The government has led the masses to prevent the virus from spreading further. At this time, it is no longer meaningful to find cases and isolate them. The virus has spread to the masses and the existing government hospitals are not capable to provide enough isolation facilities.
We are currently in the blocking period. If everyone follows the instructions to reduce outdoor activities, or the virus will spread further, an increase in cases is inevitable. The virus needs a host to survive, and we pose as a delicious dish in the eyes of the virus.
If people insist on going out during the blocking period to let the virus spreads, then we will very soon enter the Mitigation Phase.
At any stage, the high infection rate of the virus has exceeded the load and expectations of all medical institutions. When the medical institutions cannot handle a sudden surge of patients, we can only leave it in the hands of the Almighty.
As a civil servant with the government’s Ministry of Health, I am honestly telling you that we are already struggling to deal with patients on a day-to-day basis .The economy is not good, more and more patients are being admitted in the government hospitals. Private hospitals do not accept patients with Covid-19.
If there is really an outbreak, we have no ability to rescue you.
It is not that we don’t want to, it is because we can’t.
You will face with the problem of no beds in the hospital, severe shortage of ventilators and insufficient medical resources. If you don’t wake up now and don’t take responsibility of your life seriously, then at least don’t spread it to other innocent people.
There are many ways to die. Please don’t bring others along with you. That’s a mean thing to do.
I would like to ask the people of Malaysia to listen to the medical staff’s request and our mission here is to ensure everyone stays safe and healthy. Let’s work together to solve this pandemic. How about let’s wait after it’s over, then only we come out to celebrate?
Dr. Chong Yit Khang
Emergency Department, Kuala Lumpur General Hospital
Please copy and share
COVID-19 Warning By Dr. Chong Yit Khang : The Truth
After the warning by Dr. Chong Yit Khang went viral on social media, and particularly WhatsApp, the Kuala Lumpur Hospital launched an investigation.
After questioning Dr. Chong Yit Khang, they determined that he did not write the post, and whoever wrote it falsely used his name and position to lend it authority.
He subsequently made a police report about the viral message that was falsely attributed to him.
On 17 August 2020, the Director of the Kuala Lumpur Hospital, Datuk Dr. Heric Corray issued this statement (with our English translation below) :
MEDIA STATEMENT REGARDING VIRAL ISSUE IN THE WHATSAPP APP REGARDING “PLEASE COPY AND SHARE REGARDING COVID-19“
The Kuala Lumpur Hospital would like to refer to a viral news spreading through the WhatsApp application regarding the charges by a Medical Officer called Dr. Chong Yit Khang who issued a statement on the policy and operating issues of the Malaysia Ministry of Health in combating the COVID-19 pandemic.
For your information, the Kuala Lumpur Hospital would like to strongly deny the statement. The Medical Officer was identified and asked to give his feedback on this issue that went viral since March. The investigation found that his name and position was used without his knowledge and the issues in the viral message were false and not written by him. In addition, the Medical Officer made a police report about the message that associated him with the viral issue.
With regards to that, the Kuala Lumpur Hospital would like to request that the public be vigilant and do not spread unverified news or information that can cause panic and anxiety. For accurate and factual information about COVID-19 in Malaysia, please refer to the official source of the Malaysia Ministry of Health (www.moh.gov.my).
On 6 October 2020, the Malaysia Ministry of Health issued another statement about this post when it went viral for the second time.
They added the FAKE and PALSU overlays in red to make sure everyone understood that it’s fake.
COVID-19 : How To Keep Safe!
Here are a few simple steps to stay safe from COVID-19 :
ESXi has many layers of isolation within its virtualised infrastructure, but all of that is implemented in software. They still require a level of trust in the hardware, which is where AMD SEV-ES comes in.
A guest operating system that supports SEV can ask the AMD Secure Processor to issue it an encryption key, for full in-memory, in-hardware encryption.
SEV-ES extends that protection to CPU registers, so that the data inside the CPU itself is encrypted. This protects the data from being read or modified when the virtual machine stops running.
Even a compromised hypervisor that accesses the register data cannot make use of it, because it is now encrypted.
Needless to say, adding support for AMD SEV-ES in vSphere 7 will spur the uptake of AMD EPYC processors in the datacenter.
Even during the COVID-19 pandemic, hackers have been attacking the healthcare system already buckling under pressure.
Take a look at the first part of a newly-released documentary on how hackers are attacking the healthcare system, and what it means for us and the world!
How Hackers Attack Healthcare During COVID-19 Pandemic!
Cybercriminals and state-sponsored hackers do not care that almost a million people have died from COVID-19. In fact, they see the pandemic as an opportunity.
Over the last few months, the creators of this documentary spoke to hospitals, law enforcement agencies, health organisations and research centres across the world, to understand how they are coping with increased cyberattacks and malware.
This particular feature was directed by Didi Mae Hand, and produced by Max Peltz.
Hackers Increased Attacks On Healthcare During COVID-19 Pandemic
The documentary reveals a shocking surge in cyberattacks on healthcare systems during the COVID-19 pandemic. The World Health Organisation (WHO), for example, reported a 5X increase in cyberattacks on its systems since March 2020.
State-sponsored hackers are mainly looking for biodata, including research on COVID-19 vaccines. Meanwhile, cybercriminals are capitalising on the fact that hospitals may be more willing than usual to pay a ransom.
For example, the Brno University Hospital, which was responsible for running a big share of COVID-19 testing in the Czech Republic, was held to ransom and forced to shut down its IT network at a critical time.
Fortunately, the surge in cyberattacks was met with an incredible response by the cybersecurity community. Some 3000 cybersecurity volunteers created the CV19 group to provide hospitals and healthcare institutions with free support to protect their systems.
In a bit of good news after months of bad news, HUAWEI announced that their 5G wireless and core network equipment passed the GSMA Network Equipment Security Assurance Scheme (NESAS) audit!
5G RAN gNodeB
5G Core UDG, UDM, UNC, UPCF
Here is a summary of the twenty NESAS assessment categories and the compliance levels of the HUAWEI 5G equipment that were tested :
Prior to passing the GSMA NESAS audit, these HUAWEI 5G equipment also passed the 5G cybersecurity test by China’s IMT-2020 (5G) Promotion Group, using test specifications based on 3GPP International standards for 5G security assurance.
HUAWEI 5G Faces Political, Not Technical, Pressures
Passing the GSMA NESAS audit will help assuage the cybersecurity concerns of nations planning, or already implementing HUAWEI 5G network equipment.
However, HUAWEI faces political, not technical, pressures with their 5G network equipment.
The 100% compliance score in the NESAS audit will not change minds in the US, and their Five Eyes partners are unlikely to consider HUAWEI 5G equipment.
That said, passing this audit will nevertheless strengthen HUAWEI’s shield against claims that their 5G equipment pose much greater cybersecurity risks than competing platforms.
It will help them win additional contracts in smaller countries whose concerns are far less about cybersecurity and privacy, and more with costs.
GSMA Network Security Assurance Scheme (NESAS)
The GSMA Network Equipment Security Assurance Scheme (NESAS) audit is a standardised cybersecurity assessment mechanism, jointly defined by GSMA (GSM Association) and 3GPP, together with regulators, industry partners, major global operators, and vendors.
This is a voluntary program which network equipment vendors can subject their product development and lifecycle processes to a comprehensive and independent security audit.
The GSMA NESAS covers 20 assessment categories, defining security requirements with an assessment framework for 5G product development and product lifecycle processes. It also uses security test cases by 3GPP to assess the security of network equipment.
Instead, they recommended that you use these two built-in features for your privacy :
A. The Green Camera Indicator Light
Apple points out that your Mac computer has a camera indicator light that glows green whenever the camera is active.
They also claimed that the camera is designed not to activate unless its indicator light is also turned on.
B. The Camera Access Control
As an additional measure built into macOS Mojave or later, you must give an app permission before it can use your Mac computer’s camera.
To view which apps has access to your Mac computer’s camera, and to revoke any app’s access :
On your Mac, choose Apple menu > System Preferences, click Security & Privacy, then click Privacy.
Select the tickbox next to an app to allow it to access your camera.Deselect the tickbox to turn off access for that app.If you turn off access for an app, you’re asked to turn it on again the next time that app tries to use your camera.
Why Apple Is Wrong, And You Need To Cover Your Mac Camera!
Apple fans may hate us for this, but they are wrong. You must physically cover your Mac computer’s camera to protect yourself.
Hackers Always Disable The Indicator Light
Mac computers are not the only ones to feature an indicator light for their built-in cameras. Most computers with a built-in webcam have such an indicator light.
It is, therefore, SOP for hackers to disable the indicator light after gaining control of the camera. Camfecting attacks won’t work if you are aware that the camera is turned on…
Apple asserts that the camera and its indicator light on Mac computers are wired in series, so the camera won’t work if the indicator light is turned off.
However, a 2013 Johns Hopkins University paper showed how it was possible to disable the indicator light of a Mac computer’s webcam, even though the camera module had a “hardware interlock”.
This isn’t just an obscure research subject. The FBI has the capability to covertly activate a computer’s camera without triggering the indicator light, according to Marcus Thomas, the former assistant director of FBI’s Operational Technology Division.
The only ways to prevent such attacks would be to either turn off your computer, or physically cover the camera.
Hackers Won’t Ask You For Permission
Security researcher Ryan Pickren showed in April 2020 how seven flaws in Apple Safari can let malicious websites hijack your camera and microphone to spy on you.
All you have to do is click on a link, and it lets the malicious website gain access to your webcam without asking for permission.
So much for the Mac Camera Access Control feature…
You May Not Notice The Light
Even if the camera indicator light is not disabled, it doesn’t mean you will immediately realise when the light turns on.
By the time you realise the green light is actually glowing, it may already be too late.
This is partly because it emits a steady glow, and doesn’t blink. Of course, a blinking light is bloody irritating, but we are more likely to notice it than a static green glow.
The only way to prevent that is to physically cover the camera.
Hackers Can Turn On Sleeping Or Hibernating Computers
Don’t assume that just because your Mac computer is sleeping or hibernating, hackers cannot access its camera.
They can potentially wake your computer, turn on the camera and record from it, with the indicator light turned off.
Security researcher Pedro Vilaça showed in 2015 how it was possible to remotely “root” and take over a Mac computer after it wakes up from sleep mode of 30 seconds or longer.
Irrespective of the method used, once hackers gain control of your computer, they can turn on its Wake On LAN (WOL) feature to remotely wake up your computer, like what the Ryuk ransomware does.
The only way to prevent that is to turn off your computer, or physically cover the camera.
Cybercriminals Can Trick You With A Fake Blackmail
Even if cybercriminals are unable to access your camera, they can still trick you into believing they somehow took compromising photos or videos from it.
They send out thousands of spam emails every day to trick people into believing they have been caught on camera.
People who don’t use a camera cover can be convinced into believing that their webcams were somehow compromised, and tricked into paying up to avoid exposure.
The only way to prevent that is to physically cover the camera.
According to Apple, we should not use any camera cover that is more than 0.1 mm thick. That basically rules out any camera cover, because it is impossible to make one that thin.
They also advise again using anything that leaves an adhesive residue. So that means cellophane tape (Scotch tape) and packaging tape should be avoided.
So here are the best options for you to consider, based on your requirements :
If you don’t intend to use the camera at all
a) Use your laptop in clamshell mode, with a separate monitor, keyboard and mouse
b) Cover the camera with masking tape, which is gentle and leaves no residue
If you plan to use the camera
– Cut a small piece of sticky note, so that there is an adhesive part and a non-adhesive part.
– Alternatively, cut a piece of masking tape, and fold part of it to create a non-adhesive portion.
– Cover the camera with the adhesive part
– You can then use the non-adhesive portion to pull it off whenever you need to use the camera
Desktop Computers (iMac, iMac Pro)
Desktop computers like the iMac or iMac Pro don’t have to worry about damaging their displays with camera covers of any thickness.
We therefore recommend using a proper camera cover that slides to let you use the camera whenever you want to, and physically cover it whenever you don’t.
Just make sure the camera cover does not use excessively strong adhesive, or leaves a residue that will require using solvent to remove, which could damage the display coating!
According to INTERPOL, cybercriminals are taking advantage of the COVID-19 pandemic, boosting cyberattacks at an alarming pace.
Learn more about their key findings, and what they are projecting will happen in the near future!
COVID-19 Pandemic : New Opportunities For Cyberattacks!
The COVID-19 pandemic has forced organisations and businesses to rapidly deploy remote work systems and networks to support staff working from home
Cybercriminals are taking advantage of these new COVID-19 work-from-home normals, targeting staff of major corporations, governments and critical infrastructure to steal data and generate profits.
Online Scams + Phishing
Threat actors have revised their usual online scams and phishing schemes. By deploying COVID-19 themed phishing emails, often impersonating government and health authorities, cybercriminals entice victims into providing their personal data and downloading malicious content.
Around two-thirds of member countries which responded to the global cybercrime survey reported a significant use of COVID-19 themes for phishing and online fraud since the outbreak.
Ransomware + DDoS
Cybercriminals are increasingly using disruptive malware against critical infrastructure and healthcare institutions, due to the potential for high impact and financial benefit.
In the first two weeks of April 2020, there was a spike in ransomware attacks by multiple threat groups which had been relatively dormant for the past few months.
Law enforcement investigations show the majority of attackers estimated quite accurately the maximum amount of ransom they could demand from targeted organisations.
Data Harvesting Malware
Taking advantage of the increased demand for medical supplies and information on COVID-19, there has been a significant increase of cybercriminals registering domain names containing keywords, such as “coronavirus” or “COVID”. These fraudulent websites underpin a wide variety of malicious activities including C2 servers, malware deployment and phishing.
From February to March 2020, a 569 per cent growth in malicious registrations, including malware and phishing and a 788 per cent growth in high-risk registrations were detected and reported to INTERPOL by a private sector partner.
An increasing amount of misinformation and fake news is spreading rapidly among the public. Unverified information, inadequately understood threats, and conspiracy theories have contributed to anxiety in communities and in some cases facilitated the execution of cyberattacks.
Nearly 30 per cent of countries which responded to the global cybercrime survey confirmed the circulation of false information related to COVID-19. Within a one-month period, one country reported 290 postings with the majority containing concealed malware. There are also reports of misinformation being linked to the illegal trade of fraudulent medical commodities.
Other cases of misinformation involved scams via mobile text-messages containing ‘too good to be true’ offers such as free food, special benefits, or large discounts in supermarkets.
INTERPOL : Projection Of Future COVID-19 Cyberattacks
Here are INTERPOL’s projection of future COVID-19 cyberattacks :
A further increase in cybercrime is highly likely in the near future. Vulnerabilities related to working from home and the potential for increased financial benefit will see cybercriminals continue to ramp up their activities and develop more advanced and sophisticated modi operandi.
Threat actors are likely to continue proliferating coronavirus-themed online scams and phishing campaigns to leverage public concern about the pandemic.
Business Email Compromise schemes will also likely surge due to the economic downturn and shift in the business landscape, generating new opportunities for criminal activities.
When a COVID-19 vaccination is available, it is highly probable that there will be another spike in phishing related to these medical products as well as network intrusion and cyberattacks to steal data.
Did a morgue in Michigan accidentally cremate their worker who feel asleep?
Find out what has just gone viral, and what the FACTS really are!
Claim : Napping Morgue Employee Cremated By Mistake!
People are sharing this shocking bit of news about an unfortunate morgue employee who got accidentally cremated after falling asleep on the job!
An employee of a Roseville, Michigan Funeral Home & Cremation Service died this morning, after being accidentally cremated by one of his coworkers.
According to the Police, 48-year old Paul Houston decided to take a nap one a stretcher after working for sixteen hours straight.
While he was sleeping, another employee mistook him for the corpse of a 52-year old car accident victim and carried him to the crematory.
Before anyone could notice the mistake, he had already been exposed to temperatures ranging between 1400 to 1800 degrees Fahrenheit and reduced to ashes.
Jenna Anderson, one of Mr Houston’s coworkers, says she heard him scream for about 15 seconds after the crematory was activated.
“At first, we didn’t understand where the sound was coming from. When we realized what was happening, it was too late. We shut down the heating system, but he was already dead.”
Ms. Anderson claims that the young coworker who caused the accident was a new employee, and had forgotten to check for the toe tag to make sure he had the right body.
Jenna Anderson says she heard the victim scream in agony as the crematory was reducing him to ashes.
The police has opened an investigation to determine the exact circumstances surrounding Mr Houston’s death.
Investigators have not ruled out the possibility of filing criminal charges against the employee who caused his death.
The young man could possibly be accused of criminal negligence causing death.
This one, which was apparently posted by ABC News, seems to validate the other stories about the unfortunate morgue employee…
Our Verdict : Fake Story By Satire Websites
For those who just want a simple Yes or No answer, this is yet another FAKE STORY by satire (fake story) websites.
Help stop the creation of such fake stories by BOYCOTTING fake story websites like Weekly Inquirer, news24, The Daily Star, Trendolizer, etc. DO NOT SHARE THEIR STORIES!
For the details why this is fake, please continue below….
Morgue Employee Cremated By Mistake : Hoax Debunked!
Okay, let’s start with why this is fake news, and move on to what the facts are…
Fact #1 : They Are Posted By Satire Websites
Websites like Weekly Inquirer, Trendolizer and news24 (The Daily Star) call themselves satire websites, but they are really nothing more than websites that copy and paste FAKE STORIES for the clicks.
They try their best to post shocking stories as if they are true, and doing their very best to conceal that the stories are not true. Most of them have only a tiny disclaimer at the bottom of every page, which we have to blow up to show you :
Information contained in this website is for information and entertainment purposes only.
Fact #2 : That’s Not The Real ABC Website
What’s truly egregious is ABCNews-US.com, which is nothing more than a fake news website that tries to pass itself off as the real ABC News website – ABC.com.
The only reason they do this? To trick you into sharing their fake news, so that they get more page views.
Fact #3 : That’s The Hickory Hill Funeral Home
The picture they used is of the Hickory Hill Funeral Home in Fox Meadows, Tennessee.
That morgue gained notoriety in May 2016 after WREG exposed how the owner did not have an embalmer’s licence and abandoned two bodies inside after he closed down the business.
Fact #4 : The Story Isn’t Even Logical
Never mind the bad grammar and bad spelling peppering the story, the story has more holes than Swiss cheese.
Even the most tired person would wake up if someone wheels the stretcher, and definitely when he’s being lifted and placed into a casket.
Even the stupidest of morgue employees can see that their sleeping coworker is dressed differently, possibly even in a uniform?
No one gets cremated on a stretcher. The dead body is first placed in a casket before being cremated.
The cremation process takes a long time – about 1-2 hours – to reduce a body into ashes. Yet the story claimed that he was reduced to ashes even though they turned it off, after they heard him scream?
Fact #5 : It’s The Michigan Version Of The New York Cremation Hoax!
Warnings about a new phone hack called Argentina Is Doing It are circulating on social media.
Find out what the Argentina Is Doing It phone hack is all about, and if it’s really true!
Argentina Is Doing It : A Video Phone Hack?
Messages about this new phone hack, called Argentina Is Doing It, started circulating today on WhatsApp and Twitter :
Just a heads up….They are going to start circulating a video on WhatsApp that shows how the Covid19 curve is flattening in Argentina. The file is called “Argentina is doing it”, do not open it or see it, it hacks your phone in 10 seconds and it cannot be stopped in any way. Pass the information on to your family and friends.
Now they also said it on CNN
Hackers are going to start circulating a video on WhatsApp that shows how the Covid19 curve is flattening in Argentina. The file is called “Argentina is doing it”, do not open it or see it, it hacks your phone in 10 seconds and it cannot be stopped in any way. Pass the information on to your family and friends.
Now they also said it on CNN
There is a video circulating WhatsApp that shows how the Covid19 curve is flattening in Argentina. The file is called “Argentina is doing it”, do NOT open it or see it, it hacks your phone in 10 seconds and it cannot be stopped in any way. RT!!
Argentina Is Doing It Phone Hack : Complete Bullshit
As you may surmise from the HOAX overlay we placed on the screenshots, there is no such phone hack that uses a COVID-19 video called Argentina Is Doing It. Here are the reasons why…
Reason #1 : There Is No Such Video
There is no COVID-19 video called Argentina Is Doing It. It simply does not exist.
Reason #2 : Argentina Is Far From Flattening The Curve
And such a video on Argentina flattening the curve is unlikely to be created for some time to come, because Argentina is FAR from flattening the curve.
As this graph shows, the number of new cases are increasing weekly. On 16 July, over 3600 new cases were detected, bringing the total of COVID-19 cases to just under 115,000.
Reason #3 : The Story Is Illogical
Consider this for a second – how would anyone know what hackers are planning to do? Or what they are calling it?
If hackers actually created such a malware, they would have released it. Why wait?
Reason #4 : A Video Cannot Hack Your Phone Just Like That
While not completely impossible, it would be impossible for a video to hack phones that easily.
It is plausible for a video to be created to exploit a bug in a specific video player or operating system, just like how the Android wallpaper malware worked.
Such a malware would only be able to attack specific operating systems (Android or iOS), or a specific media player. It cannot just work on every phone – that only happens in movies.
Reason #5 : CNN Never Reported On Such A Video
While the hoax claims that CNN reported on this video, they did no such thing. There is no CNN report on a phone hack using a video called Argentina Is Doing It.
Google recently introduced Confidential Computing, with Confidential VM as the first product, and it’s powered by 2nd Gen AMD EPYC!
Here’s an overview of Confidential Computing and Confidential VM, and how they leverage the 2nd Gen AMD EPYC processor!
Google Cloud Confidential Computing : What Is It?
Google Cloud encrypts customer data while it’s “at-rest” and “in-transit“. But that data must be decrypted because it can be processed.
Confidential Computing addresses that problem by encrypting data in-use – while it’s being processed. This ensures that data is kept encrypted while in memory and outside the CPU.
Google Cloud Confidential VM, Powered By 2nd Gen AMD EPYC
The first product that Google is unveiling under its Confidential Computing portfolio is Confidential VM, now in beta.
Confidential VM basically adds memory encryption to the existing suite of isolation and sandboxing techniques Google Cloud uses to keep their virtual machines secure and isolated.
This will help customers, especially those in regulated industries, to better protect sensitive data by further isolating their workloads in the cloud.
Google Cloud Confidential VM : Key Features
Powered By 2nd Gen AMD EPYC
Google Cloud Confidential VM runs on N2D series virtual machines powered by the 2nd Gen AMD EPYC processors.
It leverages the Secure Encrypted Virtualisation (SEV) feature in 2nd Gen AMD EPYC processors to keep VM memory encrypted with a dedicated per-VM instance key.
These keys are generated and managed by the AMD Secure Processor inside the EPYC processor, during VM creation and reside only inside the VM – making them inaccessible to Google, or any other virtual machines running on the host.
Your data will stay encrypted while it’s being used, indexed, queried, or trained on. Encryption keys are generated in hardware, per virtual machine and are not exportable.
Confidential VM Performance
Google Cloud worked together with the AMD Cloud Solution team to minimise the performance impact of memory encryption on workloads.
They added support for new OSS drivers (name and gvnic) to handle storage traffic and network traffic with higher throughput than older protocols, thus ensuring that Confidential VM will perform almost as fast as non-confidential VM.
According to Google, transitioning to Confidential VM is easy – all Google Cloud Platform (GCP) workloads can readily run as a Confidential VM whenever you want to.
Available OS Images
In addition to the hardware-based inline memory encryption, Google built Confidential VM on top of Shielded VM, to harden your OS image and verify the integrity of your firmware, kernel binaries and drivers.
Google currently offers images of Ubuntu v18.094, Ubuntu 20.04, Container Optimized OS (COS v81), and RHEL 8.2.
They are currently working with CentOS, Debian and other distributors to offer additional OS images for Confidential VM.
Please watch out for scammers who are pretending to be from SPRM calling you about company taxes!
Find out how they are trying to scam people, and WARN YOUR FAMILY + FRIENDS!
Scam Alert : Fake SPRM Call About Company Taxes!
Alvin was almost scammed when he received a call from a scammer pretending to be a SPRM officer :
I receive the call from this number. There was an automated message with a female voice stating that the call was from SPRM. It repeated twice, and then the call was directed to a male.
The male spoke professionally in Malay. And he claims that he is calling from SPRM. Then he didn’t mention about my name and ask is this number – 017-xxxx-xxxx my current mobile number?
When I answered yes, he said my number was registered under a company name called xxxx (PP trading Sdn Bhd I think) then he said he received a complaint.
But before he went deeper into the details he asked me to verify myself. I said why should I? I told him that if he is from government, he should have my IC number.
But out of curiosity, I gave my IC number to find out what he’s planning. He mentioned my name, “Alvin”, and he said that my company registered in Kelantan had some issues with income tax. I knew it was a scam call, and cut the call and blocked the number.
Fortunately, Alvin does not own any company, which helped him realise it was just a scam call.
But many people do, and have been, scammed by such calls, especially from government authorities like the police, SPRM or the courts.
Pretending to be someone working for the authorities makes it easier for scammers to cheat you, if you believe you might be in trouble.
Now, there will always be people who will question us – how do you know it’s fake? Are you working for SPRM?
To these geniuses, you don’t have to work for SPRM to know that this is a scam call. And here’s why…
Fact #1 : SPRM Don’t Deal With Tax Issues
First of all, the SPRM (Suruhanjaya Pencegahan Rasuah Malaysia) is the Malaysian anti-corruption agency. They will NOT call you up about tax matters involving your company.
If you or your company has tax issues, they will be handled by LHDN (Lembaga Hasil Dalam Negeri) – the Malaysian internal revenue board.
Fact #2 : SPRM Won’t Call You
If the SPRM has a need to obtain your company information, they will issue you an official letter detailing the documents they need.
They won’t call you on the telephone, and definitely not on your mobile number.
Fact #3 : SPRM Warned About These Scam Calls
SPRM itself issued this warning about such scam calls back on 4 June 2018 :
SURUHANJAYA Pencegahan Rasuah Malaysia (SPRM) menasihatkan orang ramai agar berhati-hati dan tidak terpedaya sekiranya menerima panggilan telefon meragukan mendakwa daripada SPRM yang meminta beberapa maklumat peribadi termasuk butiran-butiran sulit kerana dikhuatiri ia panggilan palsu.
Ini susulan banyak aduan diterima SPRM daripada mangsa yang terpedaya dengan panggilan palsu berkenaan kebelakangan ini.
Sehubungan itu, orang ramai yang menerima panggilan meragukan ini, dinasihatkan agar terlebih dahulu mendapatkan pengesahan daripada mana-mana pejabat SPRM terdekat menerusi talian dan alamat yang dipaparkan di portal rasmi www.sprm.gov.my.
SPRM juga akan membuat laporan polis serta berharap Suruhanjaya Komunikasi dan Multimedia Malaysia (SKMM) akan menyiasat panggilan palsu ini yang telah menjejaskan nama dan reputasi SPRM.
SURUHANJAYA PENCEGAHAN RASUAH MALAYSIA PUTRAJAYA 4 JUN 2018
Fake SPRM Call About Company Taxes : What Should You Do?
If you receive such scam calls, whether they are from SPRM or the courts, here is what you can do :
give the scammer a piece of your mind
record the call and post it online to expose them
lodge a complaint with SPRM and the police
if you have free time, play along to waste their time and prevent them from scamming others
Under NO CIRCUMSTANCES should you ever fall for this scam. Whatever you choose to do, do NOT believe for a second that you are in any trouble.
Do not give them any information about your company, bank account, etc. Certainly do not entertain any requests to transfer your money, or pay them a bribe to “solve the problem”.
And yes, please SHARE this article with your family and friends, to make sure they don’t get scammed!
myBurgerLab recently posted a private conversation they had with a student, exposing him for being rude and asking the public to “help roast this fella“.
To help “roast” the student, they shared his name and the college he was studying at, even tagging his college publicly. This has led many to wonder if they weaponised social media to cyberbully the student.
Find out what happened, and why this has incensed some netizens into speaking out against what myBurgerLab has done.
myBurgerLab vs Student : What Happened?
On 3 July 2020, a BERJAYA TVET College student privately messaged myBurgerLab to ask for help with his college project.
When he did not receive a reply after 2 hours, he sent them a rude comment, “Useless company.. Asking stuff didn’t even reply shit”
That kickstarted a conversation which myBurgerLab later posted publicly, asking the public to “Help roast this fella“, sharing his Facebook profile and the college he was from, even tagging his college in their post.
But after a public lash-back, they edited their post, not once, not twice, but FIVE TIMES, with these changes :
removing their call to roast the student for his rude remarks
removing their tagging of BERJAYA TVET College
crossing out the student’s name in their screenshot of his Facebook profile page
While many of those who read the posts universally agreed that that the student was rude, many pointed out that myBurgerLab’s response was far from professional.
Quite a few felt that sharing the student’s Facebook profile page while asking their supporters to “help roast” him was disproportionate, and can even be considered as cyberbullying the student.
Christopher Gomez wrote a great piece below in the Beyond Malaysia group, which he kindly shared with us.
We are covering this issue to remind everyone about the dangers of cyberbullying.
While businesses may be unfairly attacked on social media, it doesn’t give them the right to weaponise it and send their supporters to target someone they don’t like.
We say this to myBurgerLab and everyone else who supported their actions – SAY NO TO CYBERBULLYING!
myBurgerLab : Exposing A Troll Or Cyberbullying A Student?
by Christopher Gomez
After reading and assessing the contents, I’m of the opinion that Burger Lab should be brought to task.
They insulted the student. Then even went to the extent of publicly shaming this student, his mother and his school. And if all those acts weren’t horrible enough, they went on to ask the wider community to ‘attack’ him via roasting him publicly.
Via their edits, you might see that it seems to look like their response was seemingly thought out, intentional, and meant to cause ‘hurt’.
And they made 5 edits. It took them 5 (FIVE) edits over the span of an hour, to seemingly justify their actions.
In the edits they made to that post, it seemed to me that all this was “content” for them. Perhaps to them, whether the outcome out of all this was good or not-so-good, it’s still publicity for them.
To me, their response to the student seemed premeditated.
To me, they weaponized social media.
They got upset and took it out on a “kid”, his mother and even on his school, and then they weaponized their social media following by seemingly attempting to get their audience on their side and perhaps even riled up, and attack the student (and perhaps even his parents/family/school).
To me, their use of the word “repercussions” in this context shows the kind of company, Burger Lab, is. They seem to demonstrate clearly that they knew what they were doing, when they put out their response. They shamed the boy, his parents and his school.
And their “apologies” line in Point No. 5 of their post, shows me how much they just wanted to quickly brush aside their mistake and then turn the focus back on trolling/bullying the kid.
In Point No. 3 of their post, they even go to the extent of justifying their actions and downplaying the dangers of revealing a user’s identity ( irrespective if it is was an in-real-life identity or a pseudonym ).
BTW, take note that in Point No. 4 of their post, they admitted that they were shaming him in public. But they justified it by showing that their action was some kind of ‘service to society’.
I strongly urge Malaysians to really think about how they spend their money in Malaysia. In the United States, Japan and many of the countries in the EU, you’ll see that the public stops their patronage of a business when that business behaves poorly. That’s consumer activism at its easiest — it’s simple, quick and effective.
Even in Singapore this form of consumer activism is actively practiced. When businesses behave like jerks (no matter what the reason may be) Singaporeans respond by not supporting them.
I’m writing this to encourage each of you to really think about where you want your money to go?
I’m calling a spade a spade — I would be furious with my kid if he or she did this ( in real life or on social media ) but potentially putting my child in harms way is disgusting and life threatening. The way Burger Lab went about this, they should be reported and charges should be brought against them.
Heck, I am sure none of you will tolerate your kid behaving this way, but if you received a response such as this from a company, you know they have put your child’s life (for the present time and future) in danger.
Approximately two months ago, it was reported in the Malaysian media that we lost a young lady to cyberbullying. The whole country was in shock. The local authorities are still working on this problem, and are trying to find solutions.
So as a group, as a community let’s be part of the solution. Begin by:
Stopping your support for businesses that bully, are seemingly proud that they behave like bullies, encourages others to bully, and are seemingly proud they were able to try to encourage others to bully.
Stopping our support for business that endanger the lives of our kids, exploits the kindness of our community, and encourages us to behave in such a horrible and potentially irreversibly damaging way.
I, now, personally think Burger Lab doesn’t deserve to be in business. Is there a possibility that their management will respond the way World of Buzz did? Maybe. But there’s more and more evidence out there that shows that the staff of a company behaves according to a company’s culture, and the company’s culture is set in place and nurtured by its management. Malaysian companies or companies operating in Malaysia cannot keep giving excuses, shoddy apologies and shoddy solutions and keep remaining in business.
Granted, the student who sent the private message was rude, but he could have been cyber-bullied (and is probably already being cyber/bullied) to the point of no return. Personally, this is something I can’t overlook, and I can’t forgive.
myBurgerLab vs Student : Latest Updates
On 5 July 2020, the controversy led myBurgerLab co-founder Renyi Chin to post a public statement :
Hey everyone. I hope everyone is having a great weekend. It’s time to address the issue.
First of all, my name is Renyi and I’m one of the cofounder of myBurgerLab. I’ve been responsible for maintaining the voice and direction of myBurgerLab for the most part, since its inception in 2012. So for those assuming we hired an intern and he “screwed up”, nope, it was me. I replied to him and made the post.
While it may seem like we all have split opinions on this, allow me to explain why I replied and posted as I did. Roast me personally later.
The myBurgerLab team addresses hundreds of messages every other week on social media – some nice, some unkind but mostly harmless. One thing though, we always make it a point to attend to every educational request, especially for projects. Yes, we do miss out on some, but we’ll always try to reply and make time to take a call, zoom, or even meet up. Don’t take my word for it, our record will show that we‘ve always been advocates for higher learning and are active participants in that process.
Almost all educational project collabs are productive and insightful, for both the student and the company. But every now and then we do get requests from students that can be really absurd. We even have students basically asking us to write their report for them (student: I give you questions, you type out answer can?).
On Friday afternoon, a student sent us a pm on FB, and expected an immediate reply. We usually attend to non-pressing matters after office hours. Unfortunately, he chose to hurl insults at us after just two hours before we had a chance to reply. With this, I already knew that we would not afford him the time that could be better spent on others. In my usual tone, I told him to bugger off nicely. Which was then met with more insults. If you think I should have acted professionally, I did.
My intention doing what I did thereafter, is to let everyone know that just because you are sitting behind a screen, it gives you no right to be abusive. It’s never ok to mistreat people in the service industry just because we are here to serve, that doesn’t make it okay for you to spit on us. In response, I wanted to bring light to his abusive online persona. Yes, I agree that the original post calling to roast him was wrong. It was intended to be a joke, a poor attempt at that, and was unfortunately taken into another direction. I corrected the post accordingly after reading the comments. I apologize for the poor choice of words in the original post.
I believe that calling out a bully is not bullying. In the face of any abuse, speak up. We shouldn’t be afraid to stand up for ourselves and for the people we care about. We are here to service our customers and to serve the community however we can. As with everyone else in the service industry, we have to deal with the occasional rude and inconsiderate customer, with a smile and as professionally as we can. But if ever a customer berates us or insults the team, we will not tolerate it. And if any member of our staff is faced with such abuse, we will stand up for them.
That is what I personally chose to do. I took a stand for the brand that I love and the brand that we all spent so much time and energy growing. No one is gonna call it “sh*t” and get away with it, especially unprovoked. Look, I’d be the first to admit we aren’t perfect, if our service or burgers are not up to standard, let us know, we always welcome the feedback and will strive to do better. But in this case, the student was malicious to start with and I had no intention to let it slide.
So if you feel disappointed that I did it. I’m sorry. But I’ll stand up for my brand over and over again (with a better context) if need be.
At the moment, we are working closely with the Berjaya school team to rectify what was done wrong and I’ve personally volunteered my time for community service in the school (as a form of accountability on my part) to whichever capacity they see fit.
For those that pm me to check in on me, and sent words of solidarity, thank you. And to those who still don’t see eye to eye with me, Okay, in all fairness, you can roast me now or choose to have a dialogue. Your call. I’ll attend to it when I can.
On 6 July 2020, myBurgerLab further edited their post, removing the student’s Facebook profile after he apologised to them.
They also stated that they will be working with the school to “provide better quality education and work experiences for the betterment of the industry“.
Obviously, myBurgerLab believes that they were completely in the right to post the student’s private messages as an object lesson in the consequences of being rude to a business.
It is unfortunate that they do not see the danger in asking people to teach the student a lesson. That goes beyond just publicly shaming someone for acting like an asshole, and is far beyond what the student deserves for a few seconds of stupidity.
Again, we would like everyone to be aware about the dangers of CYBERBULLYING. Those with significant social media presence should be particularly careful in how they respond.
Remember – with great power, comes great responsibility…