Tag Archives: cyberattacks

myBurgerLab : Exposing A Troll Or Cyberbullying A Student?

myBurgerLab recently posted a private conversation they had with a student, exposing him for being rude and asking the public to “help roast this fella“.

To help “roast” the student, they shared his name and the college he was studying at, even tagging his college publicly. This has led many to wonder if they weaponised social media to cyberbully the student.

Find out what happened, and why this has incensed some netizens into speaking out against what myBurgerLab has done.

 

myBurgerLab vs Student : What Happened?

On 3 July 2020, a BERJAYA TVET College student privately messaged myBurgerLab to ask for help with his college project.

When he did not receive a reply after 2 hours, he sent them a rude comment, “Useless company.. Asking stuff didn’t even reply shit

That kickstarted a conversation which myBurgerLab later posted publicly, asking the public to “Help roast this fella“, sharing his Facebook profile and the college he was from, even tagging his college in their post.

But after a public lash-back, they edited their post, not once, not twice, but FIVE TIMES, with these changes :

  • removing their call to roast the student for his rude remarks
  • removing their tagging of BERJAYA TVET College
  • crossing out the student’s name in their screenshot of his Facebook profile page

While many of those who read the posts universally agreed that that the student was rude, many pointed out that myBurgerLab’s response was far from professional.

Quite a few felt that sharing the student’s Facebook profile page while asking their supporters to “help roast” him was disproportionate, and can even be considered as cyberbullying the student.

Christopher Gomez wrote a great piece below in the Beyond Malaysia group, which he kindly shared with us.

We are covering this issue to remind everyone about the dangers of cyberbullying.

While businesses may be unfairly attacked on social media, it doesn’t give them the right to weaponise it and send their supporters to target someone they don’t like.

We say this to myBurgerLab and everyone else who supported their actions – SAY NO TO CYBERBULLYING!

 

myBurgerLab : Exposing A Troll Or Cyberbullying A Student?

by Christopher Gomez

After reading and assessing the contents, I’m of the opinion that Burger Lab should be brought to task.

They insulted the student. Then even went to the extent of publicly shaming this student, his mother and his school. And if all those acts weren’t horrible enough, they went on to ask the wider community to ‘attack’ him via roasting him publicly.

Via their edits, you might see that it seems to look like their response was seemingly thought out, intentional, and meant to cause ‘hurt’.

And they made 5 edits. It took them 5 (FIVE) edits over the span of an hour, to seemingly justify their actions.

In the edits they made to that post, it seemed to me that all this was “content” for them. Perhaps to them, whether the outcome out of all this was good or not-so-good, it’s still publicity for them.

To me, their response to the student seemed premeditated.

To me, they weaponized social media.

They got upset and took it out on a “kid”, his mother and even on his school, and then they weaponized their social media following by seemingly attempting to get their audience on their side and perhaps even riled up, and attack the student (and perhaps even his parents/family/school).

To me, their use of the word “repercussions” in this context shows the kind of company, Burger Lab, is. They seem to demonstrate clearly that they knew what they were doing, when they put out their response. They shamed the boy, his parents and his school.

And their “apologies” line in Point No. 5 of their post, shows me how much they just wanted to quickly brush aside their mistake and then turn the focus back on trolling/bullying the kid.

In Point No. 3 of their post, they even go to the extent of justifying their actions and downplaying the dangers of revealing a user’s identity ( irrespective if it is was an in-real-life identity or a pseudonym ).

BTW, take note that in Point No. 4 of their post, they admitted that they were shaming him in public. But they justified it by showing that their action was some kind of ‘service to society’.

I strongly urge Malaysians to really think about how they spend their money in Malaysia. In the United States, Japan and many of the countries in the EU, you’ll see that the public stops their patronage of a business when that business behaves poorly. That’s consumer activism at its easiest — it’s simple, quick and effective.

Even in Singapore this form of consumer activism is actively practiced. When businesses behave like jerks (no matter what the reason may be) Singaporeans respond by not supporting them.

I’m writing this to encourage each of you to really think about where you want your money to go?

I’m calling a spade a spade — I would be furious with my kid if he or she did this ( in real life or on social media ) but potentially putting my child in harms way is disgusting and life threatening. The way Burger Lab went about this, they should be reported and charges should be brought against them.

Heck, I am sure none of you will tolerate your kid behaving this way, but if you received a response such as this from a company, you know they have put your child’s life (for the present time and future) in danger.

Approximately two months ago, it was reported in the Malaysian media that we lost a young lady to cyberbullying. The whole country was in shock. The local authorities are still working on this problem, and are trying to find solutions.

So as a group, as a community let’s be part of the solution. Begin by:

  • Stopping your support for businesses that bully, are seemingly proud that they behave like bullies, encourages others to bully, and are seemingly proud they were able to try to encourage others to bully.
  • Stopping our support for business that endanger the lives of our kids, exploits the kindness of our community, and encourages us to behave in such a horrible and potentially irreversibly damaging way.

I, now, personally think Burger Lab doesn’t deserve to be in business. Is there a possibility that their management will respond the way World of Buzz did? Maybe. But there’s more and more evidence out there that shows that the staff of a company behaves according to a company’s culture, and the company’s culture is set in place and nurtured by its management. Malaysian companies or companies operating in Malaysia cannot keep giving excuses, shoddy apologies and shoddy solutions and keep remaining in business.

Granted, the student who sent the private message was rude, but he could have been cyber-bullied (and is probably already being cyber/bullied) to the point of no return. Personally, this is something I can’t overlook, and I can’t forgive.

 

myBurgerLab vs Student : Latest Updates

On 5 July 2020, the controversy led myBurgerLab co-founder Renyi Chin to post a public statement :

Hey everyone. I hope everyone is having a great weekend. It’s time to address the issue.

First of all, my name is Renyi and I’m one of the cofounder of myBurgerLab. I’ve been responsible for maintaining the voice and direction of myBurgerLab for the most part, since its inception in 2012. So for those assuming we hired an intern and he “screwed up”, nope, it was me. I replied to him and made the post.

While it may seem like we all have split opinions on this, allow me to explain why I replied and posted as I did. Roast me personally later.

The myBurgerLab team addresses hundreds of messages every other week on social media – some nice, some unkind but mostly harmless. One thing though, we always make it a point to attend to every educational request, especially for projects. Yes, we do miss out on some, but we’ll always try to reply and make time to take a call, zoom, or even meet up. Don’t take my word for it, our record will show that we‘ve always been advocates for higher learning and are active participants in that process.

Almost all educational project collabs are productive and insightful, for both the student and the company. But every now and then we do get requests from students that can be really absurd. We even have students basically asking us to write their report for them (student: I give you questions, you type out answer can?).

On Friday afternoon, a student sent us a pm on FB, and expected an immediate reply. We usually attend to non-pressing matters after office hours. Unfortunately, he chose to hurl insults at us after just two hours before we had a chance to reply. With this, I already knew that we would not afford him the time that could be better spent on others. In my usual tone, I told him to bugger off nicely. Which was then met with more insults. If you think I should have acted professionally, I did.

My intention doing what I did thereafter, is to let everyone know that just because you are sitting behind a screen, it gives you no right to be abusive. It’s never ok to mistreat people in the service industry just because we are here to serve, that doesn’t make it okay for you to spit on us. In response, I wanted to bring light to his abusive online persona. Yes, I agree that the original post calling to roast him was wrong. It was intended to be a joke, a poor attempt at that, and was unfortunately taken into another direction. I corrected the post accordingly after reading the comments. I apologize for the poor choice of words in the original post.

I believe that calling out a bully is not bullying. In the face of any abuse, speak up. We shouldn’t be afraid to stand up for ourselves and for the people we care about. We are here to service our customers and to serve the community however we can. As with everyone else in the service industry, we have to deal with the occasional rude and inconsiderate customer, with a smile and as professionally as we can. But if ever a customer berates us or insults the team, we will not tolerate it. And if any member of our staff is faced with such abuse, we will stand up for them.

That is what I personally chose to do. I took a stand for the brand that I love and the brand that we all spent so much time and energy growing. No one is gonna call it “sh*t” and get away with it, especially unprovoked. Look, I’d be the first to admit we aren’t perfect, if our service or burgers are not up to standard, let us know, we always welcome the feedback and will strive to do better. But in this case, the student was malicious to start with and I had no intention to let it slide.

So if you feel disappointed that I did it. I’m sorry. But I’ll stand up for my brand over and over again (with a better context) if need be.

At the moment, we are working closely with the Berjaya school team to rectify what was done wrong and I’ve personally volunteered my time for community service in the school (as a form of accountability on my part) to whichever capacity they see fit.

For those that pm me to check in on me, and sent words of solidarity, thank you. And to those who still don’t see eye to eye with me, Okay, in all fairness, you can roast me now or choose to have a dialogue. Your call. I’ll attend to it when I can.

Sincerely,
Renyi.

On 6 July 2020, myBurgerLab further edited their post, removing the student’s Facebook profile after he apologised to them.

They also stated that they will be working with the school to “provide better quality education and work experiences for the betterment of the industry“.

Obviously, myBurgerLab believes that they were completely in the right to post the student’s private messages as an object lesson in the consequences of being rude to a business.

It is unfortunate that they do not see the danger in asking people to teach the student a lesson. That goes beyond just publicly shaming someone for acting like an asshole, and is far beyond what the student deserves for a few seconds of stupidity.

Again, we would like everyone to be aware about the dangers of CYBERBULLYING. Those with significant social media presence should be particularly careful in how they respond.

Remember – with great power, comes great responsibility…

 

Recommended Reading

Go Back To > Cybersecurity + Internet | Business | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Fact Check : Communist Revolution Monument In Penang!

Pictures of a Chinese Communist Revolution Monument in Penang are going viral.

Find out what’s going on, and what the facts really are!

 

Claim : Communist Monument In Penang Was Approved By DAP

This is the claim being shared on Facebook and social media, with our English translation :

Do You Know?

In Penang, there is a World War II memorial called the Revolution Memorial.

But it’s full of Chinese letters and the figures are all dressed as Communists.

There is absolutely no information in English or Bahasa Melayu, much less Tamil.

When people say it’s racist, [you get] angry

This monument was built as soon as DAP took over Penang from Gerakan.

 

Note : To avoid further abuse, we overlaid it with a MISLEADING warning.

Here is a selection of comments that were posted with that misleading picture, showing how it instigates hate and racial tensions :

D4Pi siap buat tugu komunis di PPinang selepas mereka berkuasa.

DAP made this Communist monument in Penang after they gained power.

Roboh kan semuanya,, pulau Pinang ialah tanah Melayu,,jgn lupa tu,, DAP memang haprak

Demolish it all. Penang is Malay soil. Don’t forget that. DAP is useless.

Say no to komunis DAP

Puak2 pengkhianat DAP..musoh melayu..musoh islam..

DAP are traitors, enemies of the Malays, enemies of Islam.

Robohkan Tugu peringatan pembunuh anak anak peribumi Melayu. kenapa di iarkan sebegitu rupa di mana anguta dan bekas angguta keselamatan kita boleh biarkan sebegitu rupa…Letupkan !

Destroy the memorial of the killers of Malay natives. Why is it being left like that? How can our security forces let this be? Blow it up!

 

Communist Revolution Monument In Penang : The Truth

The short version is this – the monument in the pictures exist, but the claims about it in the post above are all FALSE.

We would like to warn everyone to be careful of political fake news being shared to incite hatred and racial tensions.

Fact #1 : That Is The Penang Overseas Chinese Anti-War Memorial

The monument in the picture is the Penang Overseas Chinese Anti-War Memorial Park, also known as the Air Itam War Memorial Park.

It is NOT a Chinese Communist Revolution Monument.

There are two key monuments at this memorial park :

  • a bronze-coloured army supply truck being pushed by three men – memorialising the Nanyang transport volunteers from Malaya, who helped deliver supplies to China when they were blocked by the Japanese.
  • a 45-foot tall white obelisk that commemorates the Marco Polo Incident, that kicked off the Second Sino-Japanese War of 1937-1945.

The ashes of some 800 incomplete skeletons of Penang Chinese residents who died under Japanese occupation, and the Nanyang transport volunteers who died, are also buried under the obelisk.

Fact #2 : It Was Built In 1946 And Opened In 1951

Construction on the Penang Overseas Chinese Anti-War Memorial Park started in 1946, and it was officially opened in 1951.

DAP was only formed on 11 October 1965, so the claim that it was built when DAP gained power in Penang is false.

Because the People’s Republic of China was only established in 1949, the claim that this is a communist revolution monument is idiotic.

It is also extremely stupid to claim that the figures were dressed as Chinese Communists, because Communist China didn’t exist when the monument was being built!

Fact #3 : It Was Built By Private Funding

The original Penang Overseas Chinese Anti-War Memorial Park was funded entirely by the Penang China Relief Fund, a Penang-based private fundraising organisation.

It was officially opened at 11 AM on 11 November 1951 by Penang Chinese tycoon and philanthropist, Lim Lean Teng, who was the supervisory chairman of the organisation.

After the Penang China Relief Fund was dissolved in 1952, the Kong Min School was entrusted to maintain the memorial with an annual budget of $5,000, and an annual memorial service.

Fact #4 : It Was Upgraded For Its 60th Anniversary

The Board of Trustees of the Kong Min School decided to repair and upgrade the memorial to coincide with its 60th anniversary.

The RM 400,000 project also added a 60 foot-long wall relief showing Malayan transport volunteers on the Burma-China road, and a peace column with flying doves.

On top of private donations by various organisations and individuals, the Penang state government also chipped in.

When it was opened at precisely 11:11 AM on 11 November 2016 by Penang Chief Minister, Lim Guan Eng, politicians from both sides of the political divide attended the launch.

Therefore, the claim that no one knew about it, or that it was only something DAP would do, is categorically FALSE.

Photo Credit : The Sun Daily

Fact #5 : There Is Information In FOUR Languages

The memorial park has information in four languages – English, Bahasa Melayu, Chinese and Japanese.

Here is the information panel in English and Bahasa Melayu, proving that the claim there is no information in both languages are FALSE.

 

Recommended Reading

Go Back To > Cybersecurity | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Scam Alert : FG Lockdown Funds Scam Exposed!

The FG Lockdown Funds scam is going viral on WhatsApp, and here is what you need to know about it!

Be sure to share this expose with your family and friends, so they won’t get cheated!

 

FG Lockdown Funds Scam : What Is It?

The FG Lockdown Funds scam is actually a number of similar scams based around the same premise – the federal government (FG) is giving away money from their COVID-19 lockdown fund.

Which federal government? The scammers created a multitude of scams, each targeting a different country.

Malaysia

FG has finally approved and have started giving out free 500 MYR Relief Funds to each citizen

Below is how to claim and get yours credit Instantly as I have just did now

http://myr.ngodataz.com/

Note : You can only claim and get credited once and it’s also limited so get your now Instantly.

India

FG has finally approved and have started giving out free Rs.5,000 Relief Funds to each citizen.

Below is how to claim and get yours credit Instantly as I have just did now

https://bit.ly/free—funds

Note : You can only claim and get credited once and it’s also limited so get your now Instantly.

Kenya

*FG* has finally approved and have started giving out free _KSh10,000_ Relief Funds to each citizen

Below is how to claim and get yours credit Instantly as I have just did now

Needless to say – they are all SCAMS.

You should NOT participate, and you should definitely NOT share the link with anyone!

 

FG Lockdown Funds Scam Exposed!

If you click on the FG Lockdown Funds link, you will be taken to a simple website with a black background. Certainly nothing which looks like an official government website.

No matter what day load this website, it will always tell you that the offer is limited until today. And there is always 1936 lockdown packages left – this figure never changes.

After going through a meaningless survey, you are asked to share this message to seven WhatsApp groups, in order to qualify for the money.

Which government initiative do you know would require you to share on WhatsApp groups? That should have been yet another clue this is just another scam.

To make it more convincing, there is a fake comment section of people claiming to have successfully received their money.

Regardless of how many times you refresh the page, the same people will always be listed and the time code and number of people never changes.

 

FG Lockdown Funds Scam : More Details

Interestingly, the logo used in all of the FG Lockdown Funds websites is the coat of arms of Nigeria.

Does this mean they were created by Nigerians? Possibly, if they used it as an Easter egg of sorts.

The domains used by these FG Lockdown Funds websites are also brand new :

  • ngodataz.com was registered on 15 June 2020
  • ramaphosafoundation.com was registered on 12 May 2020

They also have their identities protected to avoid being identified by authorities.

 

Recommended Reading

Go Back To > Cybersecurity | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


KasperskyOS : First Successful Automotive ECU Integration!

Kaspersky just announced the first integration of their new automotive KasperskyOS into the ECU of an advanced driver assistance system by AVL SFR. Here are the details…

 

Automotive KasperskyOS : What Is It?

Modern vehicles are complex systems, which makes it hard to manage the security of its components.

KasperskyOS for automotive ECUs combines a secure microkernel operating system, with a security policy enforcement engine (Kaspersky Security System), and a trusted channel encrypted framework.

It is designed to secure onboard systems and communications, ensuring safer OTA updates, fleet management and safer autonomous driving.

 

KasperskyOS Integration Into AVL ADAS ECU

The new AVL Software and Functions GmbH (AVL SFR) ADAS ECU features two high-performance SoCs (system-on-a-chip), and a safety controller..

This new ECU platform also supports Controller Area Network, and automotive Ethernet standards, allowing for secure communications between devices in the vehicle – including cameras and LIDARs.

The integration of KasperskyOS into the ECU guarantees that undeclared functionality – either unnoticed at launch, or inserted through system updates – cannot be exploited. This is especially important in the safety of autonomous vehicles.

All interactions between electronic components is controlled by the Kaspersky Security System, the security policy engine within KasperskyOS. It monitors the launch of processes, as well as communications between those components and the operating system.

This new ADAS ECU by AVL SFR is ready for prototyping projects by OEMs and Tier-1 suppliers.

 

Kaspersky Automotive Adaptive Platform for KasperskyOS

Kaspersky is also a new associate partner of AUTOSAR, a consortium aimed at developing mutual standards for automotive software architecture.

To that effect, they developed a software development kit (SDK) called Kaspersky Automotive Adaptive Platform.

With this SDK, AVL SFR can develop applications for automated and even driverless vehicles – such as delivering auto-piloting features, controlling safety systems and monitoring their health.

This set of libraries also allows for other software to be adopted, which follow AUTOSAR Adaptive requirements, and work on KasperskyOS without additional changes.

Kaspersky Automotive Adaptive Platform is ready to be delivered and AVL SFR is showcasing its auto-piloting application to several automotive customers.

 

Suggested Reading

Go Back To > AutomotiveCybersecurity | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Fact Check : Lincoln Memorial Defaced By BLM Protestors!

Did Black Lives Matter protestors deface the famous Abraham Lincoln statue at the Lincoln Memorial?

Find out if the Lincoln Memorial was really vandalised, and what the FACTS really are!

 

Claim : Lincoln Memorial Defaced By BLM Protestors!

Black Lives Matter protestors are being accused of defacing the famous Abraham Lincoln statue at the Lincoln Memorial, and here is the picture to prove it!

This picture of the Abraham Lincoln statue spray painted with graffiti has been shared on Facebook, Twitter, etc. as evidence of the Black Lives Matter movement’s complete lack of respect for sacred American monuments.

The graffiti had messages like Black + Brown Lives Matter, #BLM, Justice, The Real Martyrs, George Floyd.

 

Lincoln Memorial Defaced By BLM Protestors : The Facts

Fact #1 : The Picture Is Fake

The picture is fake, and was edited by mapping graffiti over a picture of the Abraham Lincoln statue.

The creator did a poor job of it, lopping off the left side of the head. If that was intentionally meant to look like protestors did it, it was done badly.

The graffiti also looked odd, because he/she was mapping a 2D image over what’s really a 3D object.

Fact #2 : The Lincoln Memorial Was Protected By The National Guard

It would also be quite a feat for the BLM protestors to vandalise the Abraham Lincoln statue itself, since the DC National Guard was deployed to protect it.

Members of the D.C. National Guard stand on the steps of the Lincoln Memorial as demonstrators participate in a peaceful protest against police brutality and the death of George Floyd (Photo by Win McNamee/Getty Images)

Fact #3 : An Outer Column Was Slightly Spray-Painted

One of the outer columns at the Lincoln Memorial had Yall Not Tired Yet? spray-painted in black on the night of 30 May 2020.

However, there is no way to know whether BLM protestors or anti-protestors was responsible. The message is ambiguous.

Photo Credit : Carolyn Kaster, early Sunday May 31, 2020

Further down, the National World War II Memorial was vandalised, this time with a clearer meaning – Do Black Vets Count?

Fact #4 : National Mall and Memorial Parks Confirmed The Limited Damage

National Mall and Memorial Parks confirmed both graffitis and cleaned them up by 4 June 2020.

Fact #5 : The Lincoln Memorial Had Been Vandalised In The Past

Frankly speaking, this isn’t the first time the Lincoln Memorial was vandalised or defaced. In fact, someone actually sprayed green paint on the Abraham Lincoln statue in 2013!

In 2017, explicit graffiti was spray-painted on an inner column in the Lincoln Memorial.

 

Disinformation Campaigns

This fake picture is part of a slew of similar fake news about the George Floyd / BLM protests in the US :

So beware of similar fake posts, because they appear to be part of disinformation campaigns.

 

Recommended Reading

Go Back To > Cybersecurity | Photo + VideoHome

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Fact Check : White House Lights Out With Trump In Bunker?

The Internet is trolling Trump with this infamous picture of a White House with its lights out – virtually blacked out – while he sheltered in his bunker.

Let’s take a look at the infamous White House lights out picture, and find out if it’s genuine!

 

White House Lights Out With Trump In Bunker?

This is the infamous White House lights out photo that everyone has been sharing on social media. It even got picked up and used by some websites.

It shows a completely dark White House with its lights out, on the same night US President Donald Trump, his wife Melania and their son, Barron, were taken to the White House bunker.

 

White House Lights Out With Trump In Bunker : The Facts

Now, here are the facts about this picture, and news reports of the White House with its lights out.

Fact #1 : That White House Lights Out Photo Is Fake

The photo showing a completely dark White House is fake. According to AP, it was edited from this original Getty image that was posted on 6 December 2015.

This photo was artificially darkened, and the lit lantern removed, to create the image of a completely dark White House with its lights out.

WASHINGTON, DC – DECEMBER 06: The White House is shown at dusk December 6, 2015 in Washington, DC. U.S. President Barack Obama is scheduled to address the nation this evening from the Oval Office on his plans to battle the threat of terror attacks and defeating ISIL in the wake of last week’s attack in San Bernardino, California. (Photo by Win McNamee/Getty Images)

However, we believe that it was more likely to have been edited from a screenshot from a video from the time the White House lit up in LGBT colours on 27 June 2015.

Fact #2 : White House Lights Goes Off Every Night

According to Kaitlan Collins who does many late night photography sessions at the White House, and White House spokesperson Hogan Gidley, the White House lights go out at about 11 PM almost every night.

Fact #3 : Actual Photos Of White House That Night

Here are photos of the White House that were taken that night. They show that while the interior lights were turned off, the exterior lights were still on. At around 11 PM, the exterior lights were turned off.

Fact #4 : Trump Did Retreat To White House Bunker

Earlier claims that protestors breached the White House are false. But they concerned the Secret Service so much that Donald Trump, his wife Melania and son, Barron were moved to the White House bunker for about an hour.

This fake picture is part of a slew of similar fake news about the George Floyd protests in the US :

So beware of similar fake posts, because they appear to be part of disinformation campaigns.

 

Recommended Reading

Go Back To > CybersecurityHome

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Fact Check : White Cops Arrest Black Man, Finds He’s FBI!

A video showing white Minnesota police officers arresting a black man, only to discover that he’s really an FBI agent, has gone viral!

Take a look at the shocking video, and find out what the facts REALLY are…

 

White Cops Arrest Black Man, Finds He’s FBI!

People are sharing the shocking video of Minnesota police officers – all white – arresting a black man.

Many claimed that it happened last night, and that the police officers only backed off after they discovered that he was actually an FBI agent!

 

White Cops Arrest Black Man, Finds He’s FBI : The Facts!

While the video is genuine, the stories are completely untrue. Watch the video and our debunking! We will share the facts directly under the video.

Fact #1 : The Man Was Not An FBI Agent

If you watch the video carefully, you will note that the man never once identified himself as an FBI agent.

One of his friends also clarified that he was not an FBI agent, but a paramedic EMT.

Fact #2 : The Incident Happened One Year Ago

The incident involving Atter happened almost exactly a year ago – on 1 June 2019 at 1 AM.

The Rochester police officers thought he looked like someone with a warrant, and released him after they checked his ID and confirmed he wasn’t the person they were looking for.

The City of Rochester issued an official press release confirming this, as well as the fact that Atter was not an FBI agent.

Fact #3 : The OP Never Made Those Claims

The person (@thisisnike1) who released this video on Instagram, specifically did not claim that Atter was an FBI agent, and said that the video was over a year old :

“‪Somethin’ been telling me to hold on to this video over a year now, ok.”

This misleading use of a genuine video follows a slew of similar fake news about the George Floyd protests in the US :

So beware of similar fake posts, because they appear to be part of some disinformation campaign.

 

Recommended Reading

Go Back To > CybersecurityHome

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Fact Check : US Protestors Asking China For Help!

Pictures of George Floyd protestors in the US asking China for help are going viral, and they are all FAKE!

Find out why the pictures are fake, and they are part of a disinformation campaign surrounding the George Floyd protests in the US!

 

US Protestors Asking China For Help!

At least two pictures are circulating, showing George Floyd protestors in the US calling for China to help them fight against the American authorities. We added the HOAX overlay to prevent further abuse.

They are being shared on Facebook, WhatsApp and Reddit as examples of American hypocrisy, or comeuppance for supporting Hong Kong protestors against the Chinese government.

It is also richly ironic since Hong Kong protestors waved American flags and openly asked for the United States to liberate their city from China.

What patriotic Chinese or pro-Chinese sympathiser wouldn’t want to rub America’s nose in their hubris and constant interfering in the private affairs of foreign nations?

 

US Protestors Asking China For Help : All Fake!

Unfortunately for China and their supporters, the Americans never actually asked them for help.

In the first photo, the Chinese flag was added to the concrete barrier and the man’s sign was edited to replace the real text, Liberty or Justice Till I Can’t Breathe!!!! with CHINA HELP ME BREATHE.

Photo Credit : The Times UK

In this second picture, a large Chinese flag was added to the foreground, and HELP US CHINA added to the blank piece of paper held by the lady on the far left.

The Muslim lady on the right, was also edited – replacing her smartphone with a Chinese flag.

Peaceful demonstrators observe a moment of silence outside the US Bank Stadium during the fourth day of protests after the killing of George Floyd in Minneapolis, Minnesota, US on May 29, 2020 [Nicholas Pfosi/Reuters]

These fake pictures follow a slew of similar fake news about the George Floyd protests in the US :

So beware of similar fake posts, because they appear to be part of some disinformation campaign.

 

Recommended Reading

Go Back To > CybersecurityHome

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Fact Check : George Floyd Protestors Broke Into White House!

A video claiming to show George Floyd protestors breaking into the White House is going viral. Find out what the facts really are!

 

Claim : George Floyd Protestors Broke Into White House!

A video showing protestors apparently breaking into the White House grounds, and attacking the White House is being shared on social media, with this message :

Protestors already broke inside White House for the first time in American history, gun fire at east gate and some sources said Trump fleed with his family to Kanzas, CIA have emergency meeting in an hour!

We won’t be sharing the video, but here are four screenshots from the video :

Take note of the signboards of the two high-rise building on the left – KeyBank and Chase. This will be important later…

 

George Floyd Protestors Broke Into White House : So Fake, So Lame!

Honestly, this is a very lame fake news attempt, probably by the infamous Chinese 50 Cent Army, because they don’t seem to know much about the United States…

Fact #1 : That Was Not The White House

The creator of this fake news is hoping that you have never seen the White House, which looks like this, and is completely different from the building in the video.

It doesn’t even have a rotunda – the round dome-like structure at the top of the building shown in the video.

Fact #2 : Protestors Cannot Get Close To The White House

It is true that US President Donald Trump, Melania Trump and Barron Trump, were evacuated to the White House bunker.

However, none of the protestors that gathered near the White House actually attempted to get past the barricades, much less attack the White House itself.

From what we can tell, the protestors are being restricted to Lafayette Square, across Pennsylvania Avenue.

Fact #3 : That Was The Ohio Statehouse

The building in the video was the Ohio Statehouse. Note the two high-rise building to its left – KeyBank and Chase. You will see their signboards in the video screenshots above.

Fact #4 : The Video Was Taken On 28 May 2020

The video was taken on 28 May 2020, showing protestors vandalising the Ohio Statehouse.

The damage, according to the Capitol Square Review and Advisory Board (which is responsible for its upkeep), included :

  • 28 broken windows along the west and south sides of the building
  • damage to the wooden window frames
  • five pole lamps
  • two doors, including the West Rotunda entrance

A few protestors entered the Ohio Statehouse but quickly left.

Fact #5 : No Mainstream Media Reported On A White House Invasion

The video being shared had been recorded days ago, but no mainstream media had reported an invasion of the White House.

You would think that something like this would be major international news… right?

Fact #6 : Trump Wouldn’t Flee To Kansas

Why would US President Donald Trump flee to Kansas, when he loves staying at his estate in Mar-a-Lago in Florida?

The White House also has a bunker built to withstand a nuclear bomb. It would certainly withstand more than a few protestors.

Fact #7 : The CIA Does Not Operate Within The Country

This is the most idiotic part of the claim – that the CIA has an emergency meeting. Why would the CIA be involved with protestors in the United States?

The CIA is a foreign intelligence service that focuses on gathering, processing and analysing intelligence of foreign entities.

The FBI would be the right federal agency to look into crimes committed by these protestors. But generally, they will be handled by state police, not federal law enforcement.

 

Beware Of Other George Floyd Protest Fake News

This fake post about the White House is part of a slew of similar fake news about the George Floyd protests in the US :

So beware of similar fake posts, because they appear to be part of some disinformation campaign.

 

Recommended Reading

Go Back To > Cybersecurity | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Android Wallpaper Malware Explained + Solved!

Ice Universe shared a really interesting problem earlier today – a wallpaper that would set certain Android smartphones into a boot loop. Literally wallpaper malware!

Find out what this wallpaper malware is all about, and how to prevent it from bricking your Android smartphone!

 

Android Wallpaper Malware Explained + Solved Video

For a quick run-down, we prepared this video that explains what the wallpaper does, and how to solve the problem.

 

Android Wallpaper Malware : What Is It?

The wallpaper was first shared by Ice Universe whose friend was affected by it. As you can see, there is really nothing remarkable about it.

If you set it as a wallpaper on a vulnerable Android smartphone, it will force the device to go into a boot loop.

Once that happens, there is nothing more you can do, except to factory reset your smartphonedestroying all of its data.

 

Android Wallpaper Malware : The Cause

Ice Universe paved the way to discovering the cause when he noted that the wallpaper’s colour seemed to changed when he uploaded it to Weibo.

So we looked into the metadata of the wallpaper, and discovered that it has a specific ICC colour profile for Google Skia – E3CADAB7BD3DE5E3436874D2A9DEE126

That ICC colour profile appears to trip the Google Skia graphics engine for certain Android devices, causing them to reboot.

Technically, com.android.systemui.glwallpaper.ImageProcessHelper crashes from an ArrayIndexOutOfBoundsException while trying to load the wallpaper with the embedded colour profile.

And because the wallpaper loads when Android UI loads, it triggers another reboot. Your smartphone is now stuck in a boot loop – it will keep rebooting on loading the wallpaper.

 

Android Wallpaper Malware : The Solution

The solution is surprisingly simple – remove the ICC colour profile. You can do that by using a photo editor (like Photoshop) and simply saving the wallpaper without embedding the colour profile.

Alternatively, you can use an EXIF remover app or software to strip the wallpaper’s metadata. That should strip its colour profile as well. Just make sure you check before you load it into your phone!

The only problem is that stripping the colour profile makes the wallpaper look less vivid.

But the best thing to do is really just avoid the wallpaper altogether. Don’t even download it.

Google really needs to look into how such a bad colour profile in a picture can trip Google Skia and force the phone into a boot loop.

We should consider this a shot across the bow. Not only should we question whether we really “need” that nice wallpaper, we should be more proactive and :

  • offload our data from our smartphones on a regular basis
  • keep constant backups of our smartphone data
  • consider recording our photos and videos to a microSD card

This way, even if another wallpaper or picture malware comes along and bricks your phone, you won’t lose all of your data.

 

Recommended Reading

Go Back To > Mobile Devices | CybersecurityHome

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


THREE Fake CIMB Bank Call + SMS Scams!

Scammers are now targeting Malaysians with THREE fake CIMB Bank scams regarding online or credit card payments.

Please SHARE this scam alert with your family and friends, so they won’t get cheated!

 

THREE Fake CIMB Bank Call + SMS Scams!

Due to the COVID-19 lockdown, many Malaysians are now purchasing more online, and paying for those purchases with their credit cards.

This has attracted scammers who are now targeting both online purchasers and credit card users. In these new scams, they are pretending to be CIMB Bank.

Scam #1 : Credit Card Payment Authorisation

In this scam, the scammers used an automated call system with the number +113818415.

After you accept the call, a pre-recorded message will ask you to verify that you have just charged RM XXXX to your credit card, with these options :

  • Press 1 to accept the charge to your credit card
  • Press 2 to speak to a CIMB bank officer

Needless to say, when you opt to speak to a bank officer (fearing that you are a victim of a hacking attempt), the scammer will now convince you to transfer your money from your bank account to the bank’s account for “safe keeping”.

There is no such thing. Banks will NEVER ask you to transfer money out of your account. If they suspect fraud, they can simply disable your credit card, and deny payment to the merchant.

Scam #2 : Outstanding Credit Card Debt

In a different version of the first scam, the automated call system used a mobile number – +6012-22452090.

This time, the pre-recorded message will inform you that you owe RM XXXX on your CIMB Bank credit card.

Again, you will be offered the opportunity to speak with a CIMB Bank officer – the scammer – who will try to convince you to pay the money into a different account, or give him / her your login details.

A real bank officer will NEVER ask you to transfer money to a different bank account, or request for your login details. If you have outstanding credit card debt, the bank will just charge you interest on it.

Scam #3 : Online Purchase Warning

Happening concurrently with the scam calls is this CIMB Bank SMS scam campaign.

You may receive something like this, which looks like a genuine SMS from CIMB Bank informing you about a charge to your credit card.

 

Of course, the mobile number – +6013-688-1813 is a dead giveaway for those who are alert. But at a glance, it looks genuine enough.

If you call the scam number – 1800-81-9767, you will be connected to the scammer, who will then try to convince you to transfer money from your bank account to a CIMB Bank account for “safe keeping”.

Just like in the first scam example, no bank will ever ask you to transfer money out of your own bank account. Even if they suspect fraud, they can simply lock your account.

And again, if they suspect your credit card has been misused, they can simply disable your credit card, and deny payment to the merchant.

 

Warn Everyone About Bank Scams!

Such scams, whether they are from CIMB Bank or any other bank, has the potential to cost the victim A LOT OF MONEY.

So please warn your family and friends about these scams. Share this article as widely as possible.

And if you receive a similar call, please report it to Maybank, Bank Negara and the police.

Here are different bank scams that you may want to be alert about :

 

Recommended Reading

Go Back To > Cybersecurity | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Galaxy S20 Secure Processor : How It Protects Your Data!

Samsung Galaxy S20 smartphones are amongst the most secure devices in the world, thanks to their built-in Secure Processor. Find out how the Galaxy S20 Secure Processor protects your data!

 

Galaxy S20 Secure Processor : What Is It?

Every Samsung Galaxy S20 smartphone has a slew of security features designed to protect confidential data.

At the heart of the Samsung Knox security system is the Secure Processor, a physical chip that provides an isolated and secure space to store confidential data.

 

Galaxy S20 Secure Processor : How It Protects Your Data!

This short video gives you a quick overview of the Samsung Galaxy S20 Secure Processor’s key features :

Enhanced Hardware Security

Hackers can manipulate components (physical attacks), provoke hardware errors (fault attacks), or analyze heat and electromagnetic emissions (side-channel attacks) to breach smartphone security.

These hardware attacks can only happen if the hacker gets hold of the device physically. But with Galaxy S20 smartphones, their Secure Processor provides a physical shield against such attacks.

The Galaxy S20 Secure Processor continuously scrambles and encrypts the confidential data it stores. It also detects invalid voltage or temperature changes, and is equipped with security algorithms to thwart side-channel attacks.

Extra Level Of Protection

Security at the user level is also critical. To that end, the Galaxy S20 Secure Processor ensures that your lock screen PIN, pattern and password are not susceptible to guesses.

It accomplishes this by making it almost impossible for attackers to reset the error counter, which monitors the number of failed unlock attempts.

Support For Private Keys

The Galaxy S20 Secure Processor can also process blockchain private keys, which are similar to banking passwords for crypto-currency wallets.

It even supports Strongbox Keymaster, which allows it to provide hardware protection for private keys or sensitive data on third-party apps.

 

Samsung Galaxy S20 Smartphones : Where To Buy?

Here are the online purchase options for the Samsung Galaxy S20 smartphones :

Malaysia

Singapore

United States

United Kingdom

Australia

 

Recommended Reading

Go Back To > Mobile Devices | CybersecurityHome

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


GrabPay Scam : Don’t Link Your Debit Card / Bank Account!

Beware of a new GrabPay scam that can quickly suck your debit cards and bank account dry!

Don’t link your debit card or bank account with GrabPay, and SHARE this warning with your family and friends!

 

GrabPay Scam Alert : Don’t Link Your Bank Account!

On 16 May 2020, Muhammad Syahir recounted how he was cheated of almost RM 900 through a GrayPay scam. Here is a brief summary of what happened :

  • The scammer created a new Instagram account, pretending to be the victim’s friend.
  • He messaged the victim asking for his phone number.
  • After receiving the victim’s phone number, he messaged him through Instagram to tell him about the GrabPay 8th Anniversary Campaign.
  • The victim was asked to look out for a GrabPay code, which would reveal what he won.

  • After sending the GrabPay code (not a TAC code) to the scammer, the victim saw RM 425 being debited into his GrabPay account. Unbeknownst to him, that money was from his own bank account!
  • A few minutes later, the victim received a notification that the RM 425 was paid to UNIPIN (M) SDN. BHD.
  • The scammer messaged him again on Instagram, asking for a second code that was sent to the victim.
  • The victim then received another notification from GrabPay stating that another RM 425 was paid to UNIPIN (M) SDN. BHD.
  • After that, the scammer blocked the victim on Instagram. That was when the victim got suspicious.
  • When the victim checked his bank account, he discovered that he lost RM 896.30 to the scammer.
  • In total, the scammer made 5 withdrawals through GrabPay – four from his debit card, and one from his bank account.

Another person – Patrick Saw – also fell for the same GrabPay scam, losing RM 405.

 

GrabPay Scam Alert : GrabPay Flaws?

Muhammad Syahir highlighted what he felt were major flaws with GrabPay :

  1. GrabPay allows credit / debit card transactions without CVV verification or OTP from the bank.
  2. GrabPay will not notify you about any first-time login attempt of a different gadget in a different location.
  3. GrabPay does not require users to set-up a secured PIN for any big transactions – e.g. more than RM100.
  4. If your bank account is linked to your GrabPay e-wallet, there won’t be any SMS notification for bank transfers to your e-wallet.

According to his experience, the scammer only needed to use the Grab Activation Code to withdraw money from all bank accounts / debit cards linked to your GrabPay app.

 

GrabPay Scam Alert : How To Avoid It?

To avoid falling prey to such a scam, here is what you should do :

  • NEVER accept a friendship request from a new social media account, until you have verified with your friend (through a phone call or face-to-face) that he/she created that new account.
  • NEVER send any code you receive to anyone. Even if it is a friend, why does he/she need the code that was sent to YOU?
  • Businesses will never give away free money for anniversaries. Don’t fall for such an old trick!
  • NEVER link your debit card or bank account to an e-wallet. Only link a credit card, because they are insured and protected against fraud. If you get scammed, you can call the bank to ask for a refund.

 

GrabPay Scam Alert : Original Post + Police Report

Here was what Muhammad Syahir posted earlier, together with his police report :

SCAM ALERT VIA GRAB PAY!
It happened to me last night and I have lost almost RM1K in a few minutes via Grab Pay.

The incident happened when one of my close friends re-created a new Instagram account and requested to follow me. He messaged me and asked for my phone number via Instagram message. Without any doubt, I gave him my phone number, knowing that he probably has lost my phone number.

He posted a few photos to his newly-created Instagram account so it does not look like a phishing account.

After that, he sent another message to me about GrabPay 8th year special campaign. He was telling me that I will send a message with a code to your phone and please let me know the code and I will see what you have won.

Grab Activation Code was sent to my phone number. It was an activation code not TAC code. I gave the activation code to him without any doubt because I know that he is my friend. Also, I was thinking of this is just an activation code, it has nothing to do with my bank accounts.

The tricks started here. I saw RM425 was debited to my GrabPay account and I did not know that it was from my bank account which was linked to the GrabPay account. After a few minutes, I received a new notification from the GrabPay that RM425 was paid to UNIPIN (M) SDN BHD.

The scammer then messaged me again on Instagram. Another activation code was sent to your phone, please let me know the code. Then, I have received another notification from GrabPay that another RM425 was paid to UNIPIN (M) SDN BHD.

When I was about to reply him a message, he blocked me up. That was the time that I know something fishy has happened. When I checked my Maybank2u, I have lost a total amount of RM896.30 from my bank account. The scammer has cleared all the money in my bank account and left RM60 balance to my GrabPay.

The scammer did a total of 5 transactions as you can see from my GrabPay activity picture below. 4 transactions were made directly via debit card which is linked to my GrabPay account and 1 transaction was made via Maybank2u. The scammer even managed to access my Maybank2u account from the GrabPay account.

It happened to me in a blink of an eye where you were blinded by this scammer who cat fished your close friend to do this scam.

On top of that, let me highlight the flaws of the GrabPay app:

1) Grab allows credit/debit card transaction without the bank’s authorization OTP and also the CVV verification.
2) Grab does not notify the user via email for any first-time login attempts of different gadgets in different location.
3) Upon registering this app for the past few years, Grab did not put a clause for the users to mandatorily set up their secured pin for any big transactions that are more than RM100.
4) Your bank account that is linked to your GrabPay will not notify you via sms for any debit transaction from the bank to the GrabPay.

*The scammer just need the Grab Activation Code and he can take all the money from your linked bank accounts on the Grab app. Such a flaw app!

Please be aware of this scam and help me to share this news. I have also tag a person who has faced the same case last week. You may also check on his Facebook profile. Patrick Saw has lost RM405 from the scammer who has approached him the same way as mine.

 

Recommended Reading

Go Back To > Cybersecurity | SoftwareHome

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Ransomware Warning : 1 in 3 Attacks Target Business Users!

INTERPOL and Kaspersky are urging organisations to protect their data against ransomware, because 1 in 3 attacks target business users!

 

Ransomware Warning : 1 in 3 Attacks Target Business Users!

Recent Kaspersky research revealed that in 2019, WannaCry is still the most prevalent ransomware circulating, and some 30% of people targeted by ransomware were business users!

  • 30% of ransomware attacks targeted business users
  • Organisations lost, on average, US$1.46 million in costs, fines and repetitional damage in 2019
  • WannaCry attacked 164,433 users in 2019, and accounted for 21% of all ransomware attacks.
  • GrandCrab accounted for 11% of attacks, while Stop accounted for 4%.

WannaCry, arguably the world’s most famous ransomware, reached its peak 3 years ago – on 12 May 2017 – but continues to wreak havoc on unsuspecting victims.

GrandCrab is famous for its ransomware-as-a-service model, rented out to cybercriminals by its developers. Meanwhile, Stop spreads through compromised software and websites, as well as adware.

 

Ransomware : How To Protect Your Business

Here are some tips that Kaspersky is recommending to stay protected against ransomware :

  • Explain to employees how following simple rules can help a company avoid ransomware incidents.
  • Always have fresh back-up copies of your files so you can replace them in case they are lost (e.g. due to malware or a broken device).
  • Don’t just rely on a physical backup, but also store your backup in the cloud for greater reliability.
  • Always update your operating system and software to eliminate recent vulnerabilities.
  • Use anti-ransomware software, which will prevent ransomware from exploiting vulnerabilities in software and applications – especially important for customers who continue to use Windows 7.

And if a corporate device is encrypted by ransomware, please remember that the attack is a criminal offence. You should NOT pay the ransom.

Instead, report the ransomware attack to your local law enforcement agency, and find a decryptor that may work for you. Some are available for FREE.

 

Suggested Reading

Go Back To > Cybersecurity | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Acronis Cyber Protect : What Does It Offer?

Acronis Cyber Protect claims to be the “world’s first complete cyber protection solution” for businesses and Managed Service Providers (MSPs).

Let’s take a look at what Acronis Cyber Protect offers!

 

Acronis Cyber Protect : What Is It?

Acronis Cyber Protect is a new cyber protection solution, which combines three key features :

  • Backup and Recovery : to allow reliable recovery of data, apps and systems
  • Malware Protection : to defend data with anti-malware and anti-ransomware protection
  • Security Controls : save IT resources with a simplified but comprehensive endpoint management toolkit

 

Acronis Cyber Protect : Business Benefits

This is what Acronis Cyber Protect promises to offer businesses :

Benefit #1 : Data Availability

Create regular, reliable backups of your data automatically and store them securely so they are instantly available whenever needed.

Benefit #2 : Fast Remediation

Restore data to any device – servers, workstations, VMs, and mobile devices – using full reimage, granular restore, or Instant Restore.

Benefit #3 : Downtime Prevention

Avoid the kind of costly system downtime that’s caused by ransomware, configuration errors, unpatched vulnerabilities, or faulty hardware.

Benefit #4 : Lower TCO

Improve performance, internal SLAs, and IT efficiencies so you can focus on important tasks, while simplifying training and maintenance.

Benefit #5 : Streamlined Protection

Eliminate complexity from your operations with one solution that integrates data protection, malware prevention, and security controls.

 

Acronis Cyber Protect : MSP Benefits

This is what Acronis Cyber Protect promises to offer Managed Service Providers (MSPs) :

Benefit #1 : Improved Profitability

Attract new business, upsell existing customers, and improve your ARPU by offering a full range of superior data protection services.

Benefit #2 : Easier SLA Compliance

Ensure that you are meeting your SLA requirements by helping customers avoid downtime and enabling immediate restores when needed.

Benefit #3 : Greater Cost Control

Reduce administrative costs by using one tool for all tasks – backups, onboarding, monitoring, managing, assistance, and reporting.

Benefit #4 : Decreased Churn

Keep your existing customers happy and satisfied so they come back for more – generating greater financial stability for your business.

 

Acronis Cyber Protect : Availability + Promotion

Acronis Cyber Protect has yet to be released, but you can request for Early Access.

Acronis is also offering Cyber Protect at the same cost of Acronis Cyber Backup Cloud for all service providers until July 31, 2020.

 

Recommended Reading

Go Back To >  Software | Cybersecurity | Enterprise | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

AMD GPU Source Code Hack : What’s Going On?

In case you missed it, AMD suffered a massive cybersecurity breach, losing the source codes to their Navi 10, Navi 21 and Arden GPUs in a hack!

Here is a summary of how the hack went down, and what this could mean for AMD and their partners…

 

AMD GPU Source Code Hack : A Quick Summary

A hacker managed to get her hands on AMD source codes for current and future graphics products, and has apparently tried to blackmail AMD.

After that failed, she leaked some of the source codes on Github, and threatened to release everything if she does not find a buyer.

The hacker recently leaked some of the source codes on Github, which was quickly removed after AMD issued a DMCA notice.

She has treated to release all of the stolen source codes, if she does not find a buyer for them,.

 

AMD GPU Source Code Hack : The Timeline

November 2019

A hacker called Palesa hacked into an unprotected computer / server, where she found and downloaded AMD source codes, which were determined to be for :

  • the current Navi 10 GPU (based on RDNA)
  • the upcoming Navi 21 GPU (based on RDNA 2), as well as
  • the Arden SoC for the Microsoft Xbox Series X console.

The source code was unexpectedly achieved from an unprotected computer / server through some exploits.

I later found out about the files inside it. They weren’t even protected properly or even encrypted with anything which is just sad.

Palesa told TorrentFreak that she valued the source codes at $100 million, but did not reveal how she came to that mind-blowing valuation.

Credit : WCCFTech

December 2019

Palesa contacted AMD, allegedly to blackmail them into paying for the return of the source codes.

Mid-March 2020

Rumours started circulating that a hacker obtained the source codes for Navi 10, Navi 21 and Arden.

24 March 2020

AMD discovered that some of the source codes were uploaded to the new xxXsoullessXxx repository on Github, as the project called AMD-navi-GPU-HARDWARE-SOURCE.

They issued a DCMA notice, notifying Github that, “This repository contains intellectual property owned by and stolen from AMD.” and that “The original IP is held privately and was stolen from AMD.

Github took down that repository, as well as four other repositories that AMD later identified as forks :

25 March 2020

When contacted by TorrentFreak, Palesa said that she will leak all of the stolen source codes if she does not get a buyer for them :

If I get no buyer I will just leak everything.

AMD issued this statement on the theft of their graphics IP :

At AMD, data security and the protection of our intellectual property are a priority. In December 2019, we were contacted by someone who claimed to have test files related to a subset of our current and future graphics products, some of which were recently posted online, but have since been taken down.

While we are aware the perpetrator has additional files that have not been made public, we believe the stolen graphics IP is not core to the competitiveness or security of our graphics products. We are not aware of the perpetrator possessing any other AMD IP.

We are working closely with law enforcement officials and other experts as a part of an ongoing criminal investigation.

 

AMD GPU Source Code Hack : What Was Leaked So Far?

According to WCCFTech who spoke to people who have vast experience with Verilog, and viewed those source codes, this was what was leaked so far :

  • Partial Verilog files that are typically used in the construction of processors.
  • The Verilog files in question represent a single and isolated function(s) on the GPU – NOT the whole/actual GPU blueprint.
  • Based on the leaker’s screenshots, the files not yet leaked are more of the same and also nowhere close to being a complete “source code”.
  • These Verilog files are built on a proprietary schematic that is only compatible with AMD’s internal design language (in other words, these are going to be close to useless to a third party).

 

AMD GPU Source Code Hack : The Implications

From what those experts told WCCFTech, the leaked source codes :

  • cannot be used to design or reverse engineer any of the three GPUs.
  • cannot be used to easily determine product specifications
  • cannot be used to bypass security features on AMD GPUs, although they may reveal vulnerabilities that can be exploited
  • does not contain any “crown jewel” IP

That said, their opinions are based on what was leaked so far. It is possible that Palesa may have at lot more that she has not revealed.

But considering the fact that she took the step of leaking some source code, they are likely not useful or important enough to be worth the trouble, especially now that a criminal investigation is underway.

What this leak has likely achieved is put a target on Palesa’s back, cause some embarrassment to AMD, and force them to relook at their cybersecurity measures and protocols.

 

Recommended Reading

Go Back To > Cybersecurity | Computer | Software | Home

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


COVID-19 Email Scams + Malware Are Spreading!

As the COVID-19 coronavirus spreads across the world, so are COVID-19 email scams and malware!

Tatyana Shcherbakova tells us what she and her team discovered!

 

Warning : COVID-19 Email Scams Are Spreading!

As the COVID-19 coronavirus spreads, fake information is being created and distributed at a very high rate, confusing people all over the world.

Cybercriminals are taking advantage of the confusion, creating various email scams, with some realistic ones pretending to be from the WHO.

Tatyana Shcherbakova, a senior web content analyst, details how her team looked at the COVID-19 email scams, and came across the realistic ones from WHO…

 

WHO Is Warning You? These Are COVID-19 Email Scams!

At first, we found emails offering products such as masks, and then the topic became more commonly used in Nigerian spam emails. We also found scam emails with phishing links and malicious attachments.

One of the latest spam campaigns mimics the World Health Organization (WHO), showing how cybercriminals recognize and are capitalizing on the important role WHO has in providing trustworthy information about the coronavirus.

Users receive emails allegedly from WHO, which supposedly offer information about safety measures to be taken to avoid a COVID-19 infection.

Once a user clicks on the link embedded in the email, they are redirected to a phishing website and prompted to share personal information, which ends up in the hands of cybercriminals.

This scam looks more realistic than other examples we have seen lately, such as alleged donations from the World Bank or IMF for anyone who needs a loan.

In order to stay safe, we advise users to carefully study the content of the emails they receive and only trust reliable sources.

If you are promised a vaccine for the virus or some magic protective measures, or content of the email is making you worried, it has most likely come from cybercriminals.

This is especially true if the sender suggests clicking on a link and sharing your personal data or opening an attachment.

You should not donate any real money or trust information with promises to help those affected by the virus, even if the email comes from someone who introduces themselves as an employee of a trusted organization.

Finally, double check the email address, as scammers often use free email services or addresses that have no relation to the organization mentioned.

 

Malware Masked As COVID-19 Coronavirus Documents!

They also found malicious files disguised as documents related to the COVID-19 coronavirus. The malicious files were masked under the guise of pdf, mp4 and docx files about the COVID-19 coronavirus.

The names of files imply that they contain video instructions on how to protect yourself from the virus, updates on the threat and even virus detection procedures, which is not actually the case.

In fact, these files contained a range of threats, from Trojans to worms, which are capable of destroying, blocking, modifying or copying data, as well as interfering with the operation of computers or computer networks.

Some malicious files are spread via email. For example, an Excel file distributed via email under the guise of a list of coronavirus victims allegedly sent from the World Health Organization (WHO) was in fact a Trojan-Downloader, which secretly downloads and installs another malicious file.

This second file was a Trojan-Spy designed to gather various data, including passwords, from the infected device and send it to the attacker.

 

COVID-19 Email Scams + Malware : How To Avoid

As governments and businesses are forced by the COVID-19 coronavirus to encourage their employees to work from home, it is critical that they employ these cybersecurity practices to reduce risk of falling for phishing attacks, or malware :

  • Provide a VPN for staff to connect securely to the corporate network
  • All corporate devices – including mobiles and laptops – should be protected with security software
  • The operating system and apps should be updated with the latest patches
  • Restrict the access rights of people connecting to the corporate network
  • Ensure that the staff are aware of the dangers of unsolicited messages

 

Recommended Reading

Go Back To > Cybersecurity | Business | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Microsoft : Cybersecurity Trends + How To Stay Safe In 2020!

As part of Safer Internet Day (SID), Antony Cook from Microsoft shared the key cybersecurity trends in 2020, and how we can stay safe against those dangers.

Even if we are experienced techies, it is enlightening to find out what Microsoft believes are the cybersecurity threats that we should be looking out for in 2020.

 

Microsoft : Key Cybersecurity Trends In 2020!

Cybersecurity Trend #1 : Less Ransomware But More Attacks

Ransomware has declined in recent years, dropping more than 60% from its peak. But Microsoft sees a rise in other types of cyberattacks.

Attackers have learned that ransomware attracts too much attention from law enforcement, and organisations have gotten better at backing up their data.

So hackers are moving onto other activities like cryptocurrency malware and phishing, where they can more easily profit with less attention.

Cybersecurity Trend #2 : Mining Malware Will Be Big!

Attackers are often acting for financial benefit, so they will make big bets on cryptocurrency, especially in Bitcoin.

They will focus more on mining malware that lets them use your computer to mine cryptocurrency coins without being detected.

Coin mining software is easily available, and cybercriminals have put malware into many widely-shared and used software. They are also trying to inject these malware through websites illegally streaming copyrighted content like the latest movies.

Cybersecurity Trend #3 : Embedded Threats

Attackers are now more sophisticated, targeting legitimate and trusted software supply points to deliver malware. There have been many examples of this attack vector :

  • a routine update for a tax accounting application,
  • popular freeware tools which have backdoors forcibly installed,
  • a server management software package,
  • an internet browser extension or site plugin,
  • malicious images which active scripts when clicked,
  • peer-to-peer applications

In those cases, attackers were able to change the code of legitimate software that people trust and install without hesitation, allowing them to “hitch a ride”.

This attack vector is very dangerous and frustrating, because it takes advantage of the trust that consumers and IT departments already have for legitimate software.

Cybersecurity Trend #4 : Phishing Scams

Phishing continues to be one of the most effective ways to compromise systems, because it targets human decisions and judgment.

Microsoft noted that the percentage of inbound emails that were detected as phishing messages increased 250% throughout 2018, and they expect the final figures for 2019 to show the same trend.

 

Microsoft : How To Stay Safe In 2020!

Here is a summary of what Microsoft believes we should do to stay safe online against cybersecurity threats in 2020 :

Cybersecurity Tip #1 : Practice Good Security Hygiene

  1. Keep your operating system and software updated.
  2. Turn on email and browser protections.
  3. Apply the cybersecurity configurations that your hardware and software vendors recommend.
  4. Stay away from any unfamiliar software or websites.
  5. Use only legitimate software, and not just your key applications.

Cybersecurity Tip #2 : Implement More Access Controls

System administrators should implement more access controls, using Zero Trust or at least privilege models.

This will limit hackers that successfully break into your network from accessing more than a segment.

Cybersecurity Tip #3 : 3-2-1 Backup!

Make sure you create and keep backups, and the cloud is a great tool for this.

Microsoft recommends adhering to the 3-2-1 rule – keep three backups of your data on two different storage types, with at least one backup offsite.

Cybersecurity Tip #4 : Keep Vigilant!

Even if we implement strong cybersecurity measures, we must remain vigilant, and keep an eye out for suspicious activity.

Not just system administrators, but users as well. If you see anything suspicious – report it to your IT department immediately.

It can be anything from a sudden slowdown in your computer’s performance, to strange web pages and images appearing.

 

Recommended Reading

Go Back To > Computer SystemsHome

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Dimension Data Expert Panels On Cyberattack Mitigation + Cloud Security

Dimension Data organised two expert panels on cyberattacks and cloud security, as part of their coverage of the 2019 NTT Security Global Threat Intelligence Report.

Find out what cybersecurity experts from Dimension Data, Cisco and more think about cloud security, cyberattacks and mitigating them.

 

Dimension Data Expert Panels On Cyberattack Mitigation + Cloud Security

Freda Liu hosted the two expert panels with Cisco, Recorded Future, F5 and Cybersecurity Malaysia and Mark Thomas, Dimension Data’s VP of Cybersecurity.

The two expert panels addressed the chief concerns of their clients, namely on cloud security, and the mitigation of cyberattacks.

 

Dimension Data Panel #1 : Top Cyberattacks + Mitigation Tips

Enterprises are continuously experiencing cyberattack survey in today’s digital world. Challenges like compliance management, coin mining, web-based attacks, and credential theft have been seen over the past year.

In this session, the Dimension Data panel of experts will provide insights about top cyberattacks and shifting threat landscape. They also discussed best practices and practical measures you can take to bolster your cybersecurity defences.

 

Dimension Data Panel #2 : Security In The Cloud

Today, cybersecurity leaders’ jobs are made more difficult as the number of areas and ‘things’ that need to be secured is constantly increasing.

Your infrastructure is no longer just physical, it’s cloud, and hybrid too.

What are the people, process and tools you need in place to help improve your organisation’s resilience and embark on the journey to world-class cybersecurity?

 

Recommended Reading

[adrotate group=”2″]

Go Back To > CybersecurityEnterprise + Business | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Sophos Global Report : Cyberattacks On Cloud Honeypots!

Sophos has just released their global report – Exposed: Cyberattacks on Cloud Honeypots with very alarming findings for servers worldwide! Get the full details and find out what this means for your business and IT operations!

 

Cyberattacks On Cloud Honeypots

A cloud honeypot is a cloud-based system set up to resemble targets of cybercriminals. When attached, they enable security experts to study the cyberattacks.

During the course of the study, Sophos had set up honeypots in 10 most popular Amazon Web Services (AWS) centers in the world like :

[adrotate group=”2″]
  • California
  • Frankfurt
  • Ireland
  • London
  • Mumbai
  • Ohio
  • Paris
  • Sao Paolo
  • Singapore
  • Sydney

 

Cyberattacks On Cloud Honeypots Report Findings

During the 30 day period, Sophos reported:

  • A cloud honeypot that was set up in Brazil was attacked a mere 52 seconds after it went live.
  • Cloud servers were attacked an average 13 times per minute.
  • More than 5 million attacks were attempted on the network of honeypots in the 30 day period

This data sends a very chilling warning to every company worldwide of the real danger cyberattackers/cybercriminals present.

Cybercriminals are constantly scanning for weak and vulnerable open cloud buckets. They are the points of entry into servers or other networks.

“The Sophos report, Exposed: Cyberattacks on Cloud Honeypots, identifies the threats organizations migrating to hybrid and all-cloud platforms face.

The aggressive speed and scale of attacks on the honeypots shows how relentlessly persistent cybercriminals are and indicates they are using botnets to target an organization’s cloud platforms.

In some instances, it may be a human attacker, but regardless, companies need a security strategy to protect what they are putting into the cloud,” said Matthew Boddy, security specialist, Sophos.

“The issue of visibility and security in cloud platforms is a big business challenge, and with increased migration to the cloud, we see this continuing.”

 

Recommended Reading

Go Back To > Cybersecurity | Home

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!