Tag Archives: Cybercrimes

25,700 Malaysians Hospitalised For Vaccine Side Effects?

Malaysians are panicking over a report by The Coverage that 25,700 Malaysians were hospitalised for COVID-19 vaccine side effects!

Find out what the FACTS really are!

 

The Coverage : 25,700 Malaysians Hospitalised For Vaccine Side Effects!

Infamous clickbait + plagiarism website – The Coverage (formerly The Coverage Bureau) is at it again.

Malaysians are panicking over a report they posted with the alarming title – Breaking News : 25,700 Malaysians Report Side Effects After Taking Vaccines – Admitted To Hospital For Further Monitoring

But what exactly are the facts? Let’s take a look…

 

No, 25,700 Malaysians Were NOT Hospitalised For Vaccine Side Effects!

We investigated this stunning report by The Coverage, and here was what we found…

Fact #1 : That’s A False, Clickbait Headline

Most Malaysians only read headlines, and The Coverage is well aware of that.

That’s why they wrote that clickbait headline, using alarming terms like “Breaking News” and “Admitted To Hospital”.

The truth is they plagiarised this article 3 days after the original website posted it (more on this below), and they were not all hospitalised as The Coverage headline alleged.

Fact #2 : Only 4.4% Reported Side Effects After Vaccination

It is true that the Malaysia Health Ministry received 25,770 reports of side effects as of 31 March 2021.

However, that is just 4.4% of the 580,765 people who were vaccinated.

Fact #3 : Reported Vaccine Side Effects Were NOT Verified

We should point out that the reported side effects have NOT been verified by the Malaysia Ministry of Health.

This is similar to the UK Yellow Card reporting system that have been intentionally misreported as genuine adverse effects (example #1, example #2, example #3)

Anyone who received a vaccination in Malaysia, can freely report any side effects they may or may not have experienced in MySejahtera.

Hence, these reported side effects may not be related to the vaccine, and have NOT been verified by the Ministry of Health.

Fact #4 : Only Those With Serious Side Effects Were Hospitalised

The Coverage article title proclaimed that 25,700 Malaysians reported side effects and were admitted to hospital for further monitoring after getting vaccinated.

The truth is their report itself clearly stated that only “those who suffered serious side effects were admitted to hospital for further monitoring“.

We can only conclude that they intentionally used that misleading headline to trick people into sharing, so that their article would go viral.

Fact #5 : The Coverage Plagiarised The Article

The Coverage is notorious for copying news articles from other websites and merely changing their titles to make them more controversial, so you are more likely to share them.

We analysed their article, and discovered that they copied it entirely from a 3-day old FreeMalaysiaToday article.

They only deleted the first paragraph, and changed the title to make it more SHOCKING! This is the very definition of plagiarism.

The Coverage has been doing this for years, making money off other people’s work, and using gullible people to share out their plagiarised articles with clickbait titles.

STOP being their useful idiots. STOP sharing their articles! STOP reading their plagiarised articles!

 

Recommended Reading

Go Back To > Health | BusinessTech ARP

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Scam Alert : Fake DON DON DONKI Giveaway!

A fake DON DON DONKI giveaway is being actively shared on social media.

Please IGNORE it, and do NOT click or participate in it

 

Scam Alert : Fake DON DON DONKI Giveaway!

After DON DON DONKI – Japan’s biggest discount chain store – opened their first store in Malaysia, people have gone ga-ga, and scammers have taken notice.

They quickly created a fake DON DON DONKI giveaway, and many people have been sharing it on WhatsApp and Facebook.

Clicking on it leads you to a fake DON DON DONKI Brand Awareness Survey.

To the uninitiated, it may appear genuine. It has a Google domain, and there is a 100% Guarantee stamp, after all. So how can this be a scam?

Consider for a second the many genuine surveys you have done in the past. Have you ever seen a survey with just TWO questions?

This fake DON DON DONKI survey is intentionally short because the scammer doesn’t want people to quit on seeing a long survey.

In a genuine survey, you would be asked to key in your details for DON DON DONKI management to contact you.

Instead, after you submit, you are taken to what appears to be a Don Don Donki page, asking if you are a member.

This is a FAKE Don Don Donki page. You have been redirected to www.promohebat-my-76.com/cgi-bin/wingame.pl, with the string partner_pk=355.

What basically happened is that you have been tricked into this page by the scammer’s affiliate with a partner number of 355, who gets paid for every person tricked into opening this page.

Whether you choose Yes or No, you will be taken to the same page which is made to look as if you are registering for the voucher.

The truth is you are being tricked into agreeing to share your information with AP Marketing Asia Pacific Limited – a Hong Kong company that collects data to sell, or to push promotions for their clients.

If you key in your details, then you are agreeing to let them sell your email address and contact information to third-parties, as well as accept promotional offers from their clients.

In the next page, they will ask you for your mobile number, and your date of birth. This exposes you to scammers who can use this information for phishing attacks against you or your bank.

In subsequent pages, you are asked to participate in surveys for their clients like Etiqa, and then asked to participate in even more surveys and games.

Ultimately, this is nothing more than a scam to get you to participate in AP Marketing Asia Pacific Limited‘s marketing games and surveys.

You will NOT receive anything and only waste your time. Even worse, you will expose your personal information to AP Marketing’s clients, who may include other scammers.

So please WARN EVERYONE about this fake Don Don Donki giveaway!

 

Don Don Donki Confirms Giveaway Scam!

Don Don Donki was quickly alerted about this giveaway scam, and they issued a statement warning their fans not to participate.

IMPORTANT NOTICE

Dear DONKI Fans,

We were informed that a fake page is pretending to be us and is running a giveaway contest.

Please note that DON DON DONKI Malaysia has only one official Facebook (https://www.facebook.com/DonDonDonkiMY) and Instagram (https://www.instagram.com/DONDONDONKIMY/)

To protect your personal details, please do not engage, instead report suspicious pages.

We are grateful for loyal DONKI fans who made us aware of this situation.

Keep safe offline and online. Thank you!

 

Recommended Reading

Go Back To > Scam Alerts | BusinessTech ARP

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Did This Doctor Die From Painkiller After COVID Vaccination?

Did this doctor die from the painkiller, Diclofenac, after getting her COVID-19 vaccination?

Find out what happened, and what the FACTS really are!

 

Claim : This Doctor Died From Painkiller After COVID-19 Vaccination!

This is the message that has gone viral on WhatsApp recently :

Dr. Hariharini Md died because she was injected Diclofenac by her husband Doctor after Covid Vaccination, so pain killers should not taken after Covid Vaccination. Valuable information

Heartbreaking news!

This young doctor Hariharini sadly passed away today following developing severe anaphylaxis to Ini. Diclofenac which was given to her by her husband at home for myalgia following Covid vaccination.

She died at Meenakshi Mission Hospital, Madurai after a brief battle in ICU.

She was doing MD Anaesthesia at Madurai Medical College and was married 4 months ago. Her husband is doing MS Gen Surg at Madurai Medical College.

She belongs to the 2012 Batch from Thanjavur Medical College.

Any type of painkiller especially diclofenac sodium in tablet or injectable form is NOT AT ALL Advisable after getting vaccinated.

The fever or body pain or pain at site of vaccine is common and a body response to the vaccine.

Kindly share with all those who have taken the vaccine or going to take.

 

The Doctor Died From Painkiller After COVID-19 Vaccination, But…

Dr. Hari Harini did indeed die after being injected with the painkiller Diclofenac, after she was vaccinated against COVID-19.

However, her death had nothing to do with the COVID-19 vaccine at all. Here are the facts of her tragic death…

Fact #1 : She Was Vaccinated A Month Earlier

Dr. Hari Harini received her first dose of the Covishield* vaccine on 5 February 2021.

Her husband only injected her with Diclofenac on 5 March 2021a month later, when she complained of a fever and body pain.

* Covishield is the brand name of the Oxford-AstraZeneca vaccine manufactured by the Serum Institute of India.

Fact #2 : Fever + Muscle Pain From Vaccine Only Last A Few Days

Fever and muscle pain are your body’s natural initial response to vaccines, and they last only a few days. Generally just a day or two.

Therefore, the fever and muscle pain Dr. Hariharini experienced a month later, had nothing to do with the vaccine.

Fact #3 : She Fell Unconscious Within Hours Of Diclofenac Injection

Dr. Harini started vomiting and fell unconscious within hours of her husband injecting her with Diclofenac.

She was rushed to a nearby hospital for medical attention, and then to a tertiary care hospital, before being brought to the Meenakshi Mission Hospital.

According to Dr. Kannan – the Medical Administrator of Meenakshi Mission Hospital, when she arrived, she was hypoxic, with a Glasgow Coma Score of 3 – the lowest possible score.

They could not revive her, and she passed away on 11 March 2021, after being on the ventilator for 4-5 days.

Fact #4 : Diclofenac Can Cause Severe Anaphylaxis

Diclofenac – a Non-Steroidal Anti-Inflammatory Drug (NSAID) – can cause severe anaphylactic reactions when injected, infused, or taken orally.

This side effect is rare, but can quickly turn deadly, especially if it was injected intramuscularly or intravenously infused.

The anaphylactic shock, when it happens, can be counteracted with an intramuscular injection of adrenaline.

Fact #5 : Her Autopsy Confirmed The Anaphylactic Shock

An autopsy was performed on Dr. Hari Harini and the provisional diagnosis was “hypoxic ischaemic encephalopathy due to anaphylactic shock“.

In other words, she suffered from brain damage from a lack of oxygen supply caused by a severe allergic reaction.

Fact #6 : Painkillers Could Dampen Vaccine Efficacy

Vaccines work by tricking your body into thinking that there is a real infection, triggering an immune response that cause “side effects” like injection site pain, fever and muscle aches.

These side effects are really your body’s natural immune response to any infection, and are therefore welcome signs that the vaccines are doing their jobs.

Research have shown that certain painkillers may dampen the body’s response to vaccines. One study even showed that NDAIDs reduce the body’s cytokine and antibody response to an actual COVID-19 infection.

That is likely why the US CDC recently updated its guidance on March 16, 2021, to :

  • avoid taking painkillers BEFORE getting vaccinated against COVID-19
  • treat post-vaccination fever by drinking plenty of fluids and dressing lightly
  • treat pain and discomfort with a cool and wet washcloth, and using or exercising the arm
  • take over-the-counter painkillers after COVID-19 vaccination, with your doctor’s advice

Unless you really need to, try to avoid taking any painkiller for the fever or muscle ache.

Recommended : Can You Take Painkillers Before / After COVID-19 Vaccination?

 

Recommended Reading

Go Back To > Health | Fact CheckHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Must Foreigners In Malaysia Carry Passport At All Times?

Must foreigners in Malaysia carry their passport at all times, because there is a massive operation to weed out illegal foreigners?

Find out what’s the latest viral message, and what the facts really are!

 

Massive Immigration Op, Have Your Passport At All Times?

A viral message has gone out, purporting to be a warning from Malaysia Immigration Director-General Dato’ Indera Khairul Dzaimee Bin Daud, with his picture attached :

All FOREIGNERS residing in Malaysia from now on should carry their PASSPORT with them at all times.

We are on [a] massive OPERATION to weed out all illegal foreigners and to enable us [to] roll out vaccination for our citizens.

FOREIGN Embassies should take note.

 

Must Foreigners In Malaysia Carry Their Passport At All Times?

Fact #1 : The Viral Message Is Fake, But…

First of all, we should point out that the Malaysia Immigration Department has officially denounced the viral message as FAKE.

That said, we believe that they are referring to the claim of a “massive OPERATION to weed out all illegal immigrants” or that it was “to enable us [to] roll out vaccination for our citizens.

Before we get to the law, let’s take a look at their statement, with our English translation :

PENAFIAN : BERITA PALSU

Orang ramai dinasihatkan supaya tidak terperdaya dengan BERITA PALSU menggunakan gambar Ketua Pengarah Imigresen.

Segera laporkan kepada Jabatan Imigresen Malaysia jika terdapat sebarang berita yang meragukan supaya tindakan sewajarnya dapat diambil.

DENIAL : FAKE NEWS

The public is advised not to be fooled by the FAKE NEWS using the picture of the Director General of Immigration.

Immediately report to the Malaysian Immigration Department if there is any suspicious news so that appropriate action can be taken.

Fact #2 : Foreigners Must Have Passport / Travel Document At All Times

Even though the message above is FALSE, foreigners should carry their passport or travel document with them at all times during their stay in Malaysia.

According to Section 6(3) of the Immigration Act 1959/63, all foreigners must be able to produce a genuine passport / travel document / entry permit with a valid endorsement / pass upon request.

Failure to produce a valid passport or travel document, with a valid pass, could result in these penalties

  • a compound of RM3,000, or
  • a fine of up to RM10,000 and/or up to 5 years imprisonment

In their advisory to foreigners, the Malaysian Immigration Department states :

As such foreign visitors are reminded :-

  1. To take precaution on the safety of their passport / travel document and must carry with them during their stay in Malaysia.
  2. Must ascertain that they produced their passport / travel document to an Immigration officer at the point of entry and has been issued with the relevant pass.
  3. To report immediately to the Immigration Department for the lost of their passport / travel document.

So it really doesn’t matter if there is a massive operation to weed out illegal immigrants or not. All foreigners should carry their passport / travel document with them at all times.

 

Recommended Reading

Go Back To > Travel | Fact ChecksHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Public Bank : More Fake SMS Scams! Do NOT Click / Call!

Scammers are targeting Public Bank customers again, using fake Public Bank SMS messages.

Do NOT click or call if you receive any of these fake SMS messages!

 

Public Bank : Fake SMS Scams! Do NOT Click / Call!

Whether you are a Public Bank customer or not, you may receive one of these alarming SMS messages :

RM0 PBB/PIBB: Your PBB account will TERMINATED on 02Dec20 01:30:00 AM. Please make verification via http://www.mypbebank.cc to avoid service interruption. Verify now keep on using PBB services.

RM0 Credit Cash out RM3,000 form card ending no 7102 successful on 01 DEC. Information system sending. Call PBB 1800-81-9566 for any query

If you receive any of these SMS messages, please DO NOT click on the link, or call the number. JUST IGNORE THEM, or delete them.

Warning: Your account is marked as insecure, please click Return PAC immediately to confirm that it is safe to use. (https://pbevip.vip/)

PBe Your account is in a high-risk state PLS log in immediately and return the PAC to protect your account security https://www.pbebanks.top

PBe Warning: Phishing URLs are frequent recently, PLS log in immediately to strengthen account security. 2Mar21 13:14 https://se1.pbevip.top/

PB e Your account is in a high-risk by the system, PLS re-verify your account https://pbbanks.red/ <security reminder is normal>

 

Public Bank Fake SMS Scam : What Happens If You Click?

Clicking on the links will often lead you to a phishing website, a fake website designed to look like a Public Bank website.

You will be asked to key in your personal information, including your Public Bank user name and password. DO NOT KEY IN YOUR INFORMATION!

But if you are free and want to help screw these scammers, key in fake information as many times as possible.

Note : These scams do not just affect Public Bank. In fact, all banks are affected :

 

Public Bank : How To Identify Fake SMS Messages

With a little help from Public Bank, let’s show you how to identify fake SMS messages.

If you spot any of these warning signs, BACK OFF and DO NOT PROCEED!

Warning Sign #1 : Grammatical Mistakes

Read the two SMS messages above, and you can easily spot numerous grammatical mistakes. A bank will never send such poorly worded messages to their customers.

Warning Sign #2 : Embedded Links

Banks will NEVER embed links (URLs) into the message. If you see embedded links, always think – SCAM SMS!

Warning Sign #3 : Wrong Links

And always check the link – www.mypbebank.cc is not the correct address for the Public Bank website (www.pbebank.com)

When you see any website with .cc links, be wary because the .CC domains are registered in the Cocos Islands – an Australian territory of only 14 km², with only about 600 inhabitants.

Warning Sign #4 : No Personal Login Phrase / Picture

To avoid phishing attacks, banks now give you a secret response (like a picture or a phrase) to confirm that you are visiting their legitimate website.

If the website you are visiting gives you the wrong picture or secret phrase, you have been tricked into visiting a fake website designed to mimic the real bank website.

You should also remember that the bank website must show you secret picture or phrase right after you enter your login, but BEFORE you key in your password.

If you are asked to key in your password without the website displaying the secret phrase or picture, you have been tricked into visiting a fake website designed to mimic the real bank website.

 

Recommended Reading

Go Back To > Cybersecurity | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

macOS, iOS, iPadOS, Safari CVE-2021-1844 Bug : Fix It Now!

Apple just rushed out macOS Big Sur 11.2.3, iOS 14.4.1, iPadOS 14.4.1 and Safari 14.0.3 to patch a critical security bug.

Find out what they fix, and why you need to update your MacBook, iPhone and iPad right away!

 

Apple Rushes Out macOS, iOS, iPadOS, Safari Critical Bug Fixes!

Released on 8 March 2021, macOS Big Sur 11.2.3 patches only one bug, which may mislead users into thinking that it’s not very important.

WebKit

Available for: macOS Big Sur

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: A memory corruption issue was addressed with improved validation.

CVE-2021-1844: Clément Lecigne of Google’s Threat Analysis Group, Alison Huffman of Microsoft Browser Vulnerability Research

On the same day, Apple also released iOS 14.4.1 and iPadOS 14.4.1 – both patching the same CVE-2021-1844 vulnerability.

WebKit

Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation)

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: A memory corruption issue was addressed with improved validation.

CVE-2021-1844: Clément Lecigne of Google’s Threat Analysis Group, Alison Huffman of Microsoft Browser Vulnerability Research

Apple also released Safari 14.0.3, which patches the same vulnerability for macOS Catalina and macOS Mojave :

WebKit

Available for: macOS Catalina and macOS Mojave

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: A memory corruption issue was addressed with improved validation.

CVE-2021-1844: Clément Lecigne of Google’s Threat Analysis Group, Alison Huffman of Microsoft Browser Vulnerability Research

 

Why Install These macOS, iOS, iPadOS, Safari Bug Fixes ASAP?

While they appear to only patch WebKit in macOS Big Sur, iOS, iPadOS and Safari, they are CRITICAL bug fixes that you need to install right away.

They patch the new CVE-2021-1844 vulnerability, which was discovered by Clément Lecigne of Google’s Threat Analysis Group and Alison Huffman of Microsoft Browser Vulnerability Research.

This vulnerability allows a remote attacker to trigger a buffer overflow when the victim opens a specially-crafted web page, allowing the attacker to execute arbitrary code on the target system.

It is not known if this vulnerability has been exploited yet, but it is critical to install the new updates to prevent that from happening.

 

Recommended Reading

Go Back To > Software | CybersecurityHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Flower of the Holy Spirit Transforms From Saint To Dove?

An orchid called the Flower of the Holy Spirit appears to change from a saint to a flying dove, when it blooms!

Learn more about this spectacular and divine miracle, and find out what the facts really are!

 

Flower of the Holy Spirit : From Saint To Dove!

People are sharing these photos of the Flower of the Holy Spirit, together with this helpful explanation :

This is one of the orchid species named Flower of the Holy Spirit. It starts blooming during Pentecostal period once a year.

Before bloom, it looks like praying saints, when the flower blooms, it looks like a flying dove. How amazing is God’s Creation!

 

Flower of the Holy Spirit : It Would Be A Miracle Indeed!

It would be a miracle if either of the two pictures above are the Flower of the Holy Spirit. The sad fact is that this is yet another divinely-inspired fake story.

The only factual thing about the whole post is that they are both orchids. Everything else was made up.

Fact #1 : Neither Are The Flower of the Holy Spirit

There is an orchid called The Flower of the Holy SpiritPeristeria elata.

Also known as the Holy Ghost orchid, dove orchid, or flor del Espiritu Santo in Spanish, this is what it looks like!

Fact #2 : The Orchid On The Left Is Green-Yellow Catasetum

The orchid that looks like praying saints? That’s Catasetum viridiflavum, commonly known as the Green-Yellow Catasetum.

We hate to burst your divine bubble again, but generally their “arms” do not fold inwards. It’s hard to find photos that show these “saints” praying…

Fact #3 : The Orchid On The Right Is White Egret Flower

The orchid that looks like a flying dove is Pecteilis radiata, commonly known as the White Egret Flower, the fringed orchid or sagisō.

Incidentally, this is the official flower of the Setagaya ward of Tokyo.

Fact #4 : They Do Not Bloom During Pentecost

As far as we can tell, orchids do not observe the Pentecost – which is generally around mid May to mid June.

  • Catasetum viridiflavum (the “praying saints”) blooms sometime between end June to end September.
  • Pecteilis radiata (the “flying dove”) blooms sometime between early December and February.

Neither of the orchids in the picture actually bloom during Pentecost…

Fact #5 : It Would Be A True Miracle If It Happens

It would be a textbook case of a true miracle if Catasetum viridiflavum blooms into Pecteilis radiata during the Pentecost.

We will be sure to update you if this miracle ever happens. But for now, this is just divine inspiration?

 

Recommended Reading

Go Back To > ScienceFact Check | Home

 

Support Tech ARP!

If you like our work, you can help support our work by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

460 Deaths + 243,612 Injuries From COVID Vaccines In UK?

Did the UK government report 460 deaths and 243,612 injuries from COVID-19 vaccines in the latest 4 March 2021 report?

Find out what’s going on, and what the FACTS really are!

 

460 Deaths + 243,612 Injuries From COVID Vaccines In UK?

Health Impact News continues to share misleading news about the COVID-19 vaccination programme in the UK.

Framing it as a report, Brian Shilhavy from Health Impact News listed what appears to be a shocking list of 460 deaths and 243,612 injuries from the Pfizer and AstraZeneca COVID-19 vaccines in the UK.

To avoid being outright labelled as fake news, he shared the report without context, only presenting them as raw numbers.

For the COVID-19 mRNA Pfizer- BioNTech vaccine analysis they report:

  • 2033 Blood disorders including 1 death
  • 1032 Cardiac disorders including 25 deaths
  • 3 Congenital disorder
  • 713 Ear disorders
  • 10 Endocrine disorders
  • 1242 Eye disorders
  • 9360 Gastrointestinal disorders including 11 deaths
  • 26,394 General disorders including 111 deaths
  • 17 Hepatic disorders
  • 466 Immune system disorders
  • 1863 Infections including 33 deaths
  • 393 Injuries including 1 death
  • 965 Investigations
  • 525 Metabolic disorders including 1 death
  • 11,565 Muscle & tissue disorders
  • 20 Neoplasms
  • 16,107 Nervous system disorders including 14 deaths
  • 29 Pregnancy conditions including 1 death
  • 1235 Psychiatric disorders
  • 187 Renal & urinary disorders
  • 338 Reproductive & breast disorders
  • 3575 Respiratory disorders including 12 deaths
  • 6042 Skin disorders including 1 death
  • 16 Social circumstances
  • 45 Surgical & medical procedures
  • 992 Vascular disorders including 1 death

Total reactions for the COVID-19 mRNA Pfizer- BioNTech vaccine212 deaths and 85,179 injuries

 

UK Report On COVID Vaccine Deaths + Injuries : The Facts

Health Impact News basically summarised the weekly Yellow Card report from the UK MHRA (Medicines and Healthcare products Regulatory Agency).

However, by omitting context about this report, the article conveys the false perception that the COVID-19 vaccines are dangerous.

Here are the facts…

Fact #1 : It Was A Yellow Card Summary Report

The UK government report mentioned in the article was the weekly Yellow Card summary report (as of 21 February 2021).

As you can tell – it is released on a weekly basis, and is otherwise not special in any sense. The 21 February edition will soon be superseded by the 28 February edition.

Fact #2 : Anyone Can Report Anything On The Yellow Card Site

What Health Impact News “neglected” to mention was that ANYONE from ANYWHERE can report ANYTHING on the Coronavirus Yellow Card reporting site.

You can report that the COVID-19 vaccine caused you all kinds of injuries, from giving you AIDS or brain cancer to killing you outright.

Heck, you can create a Yellow Card report even if you are NOT living in the UK, and have NOT actually received the vaccine!

Here are screenshots of us reporting that the Pfizer COVID-19 vaccine caused a leg fracture, that resulted in an abnormality in an unborn child!

This is how absurd the Yellow Card reporting system really is. No different from the US VAERS system really.

Fact #3 : Yellow Card Reports Are NOT Evidence Of Side Effects

Health Impact News also “neglected” to mention that Yellow Card reports are NOT evidence of actual adverse reactions.

The UK MHRA (Medicines and Healthcare products Regulatory Agency) which operates the Yellow Card programme stated very clearly that (with our emphasis) :

It is very important to note that a Yellow Card report does not necessarily mean the vaccine caused that reaction or event.

We ask for any suspicions to be reported, even if the reporter isn’t sure if it was caused by the vaccine. Reports to the scheme are known as suspected adverse reactions (ADRs).

Many suspected ADRs reported on a Yellow Card do not have any relation to the vaccine or medicine and it is often coincidental that they both occurred around the same time.

It is therefore important that the suspected ADRs described in this report are not interpreted as being proven side effects of COVID-19 vaccines.

Fact #4 : Known Side Effects Are Mild / Inconsequential

Health Impact News also intentionally “failed to expose” the fact that the side effects of both Pfizer and AstraZeneca vaccines are mild and/or inconsequential.

Thanks to large trials involving over 100,000 people, scientists have determined that the side effects of the Pfizer and AstraZeneca vaccines for COVID-19 are mild and/or inconsequential.

The UK MHRA classified the known side effects into how commonly they occur, as follows :

Pfizer-BioNTech COVID-19 Vaccine Side Effects

  • Very Common : pain at injection site, tiredness, headache, muscle pain, chills, joint pain, fever
  • Common : injection site swelling, redness at injection site, nausea
  • Uncommon : enlarged lymph nodes, feeling unwell
  • Rare : temporary one-sided facial drooping (Bell’s palsy)
  • Very Rare : severe allergic reaction

Pfizer-BioNTech COVID-19 Vaccine Side Effects

  • Very Common : tenderness, pain, warmth, redness, itching, swelling or bruising at injection site, generally felling unwell, feeling tired, chills, headache, nausea, joint pain or muscle ache
  • Common : a lump at injection site, fever, vomiting, flu-like symptoms
  • Uncommon : feeling dizzy, decreased appetite, abdominal pain, enlarged lymph nodes, sweating, itchy skin / rash

Fact #5 : COVID-19 Killed Almost 2.6 Million People… So Far

It is perplexing why Health Impact News is focusing only on the 460 “reported deaths” in the UK Yellow Card database, that have NOT been proven to be caused by the vaccine.

We should point out that as of 27 February 2021, COVID-19 has killed :

  • Almost 2.6 million people worldwide
  • Over 124,000 people in the UK

Those are real people who died from COVID-19. Real people with families who have to live with the loss.

On the other hand, the COVID-19 vaccines have been proven to be safe, and will prevent millions of deaths from what is now a preventable disease in the UK and all around the world.

 

Recommended Reading

Go Back To > MedicineFact CheckHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Seafood Scams On Facebook : How To Detect Them!

Seafood scams on Facebook have been proliferating recently, and Facebook just doesn’t care.

So it is up to all of us to spread the word and WARN EVERYONE about these seafood scams on Facebook.

Updated @ 2021-03-07 : Added another confirmed seafood scam page and two reported bank accounts.

Originally posted @ 2021-02-14

 

Seafood Scams On Facebook : What’s Going On?

We were first alerted to the world of Facebook seafood scams by people who were cheated by Ocean Sense and East Malaysia Seafood Agent.

These Facebook seafood scam pages have a simple modus operandi :

  • offer online seafood delivery at very attractive prices and even free delivery
  • advertise on Facebook to reach out to people, and avert Facebook’s ire
  • ghost you after you deposit money into their bank accounts
  • delete your negative comments on their Facebook page

Even though many people reported Ocean Sense and East Malaysia Seafood Agent as scam pages, Facebook declined to take action and they are STILL ACTIVE.

 

Seafood Scams On Facebook : How To Detect Them!

The problem with seafood scams on Facebook is how easily scammers create them. Even if they get banned by Facebook, they will simply create a new one.

Facebook also partly enables them to continue with their scam by ignoring reports, claiming that there is nothing on the scam pages that go against their Community Standards. Duh – as if the scammers will post on Facebook admitting that they are scammers.

So how do we detect these seafood scams on Facebook?

Step 1 : Check List Of Reported / Confirmed Seafood Scams

The first thing you should do is run a quick search online on the name of the seafood vendor. See if anyone has reported them to be a scam.

Confirmed Seafood Scams On Facebook

Multiple people have reported that these Facebook seafood vendors have cheated them :

Reported Seafood Scams On Facebook

These Facebook pages have been reported to be scam pages, but we haven’t been able to independently verify their reports :

Step 2 : Check With The Commercial Crimes Department

Next, use the Commercial Crimes Department’s website to check for bank accounts that have outstanding police reports.

For example, the CIMB 8604503834 has two outstanding police reports lodged against it.

DO NOT BANK ANY MONEY to any account flagged by the Commercial Crimes Department’s website.

Step 3 : Check List Of Reported Company + Bank Accounts

Just because a bank account has not been flagged by the Commercial Crimes Department’s website doesn’t mean it’s safe.

That’s because many people do not bother to lodge a police report, or it may be a recent scam.

Here is a list of reported company and bank accounts, which you should AVOID :

Name Bank Account
Yap Kok Keong CIMB 7635-3713-28
A&B Bintang Trading CIMB 8604-5038-34
Car Boutique Venture CIMB 8604-5267-74
GS 028 Seafood Trading CIMB 8604-5270-14
Lee Pea Ching CIMB 7075-3700-47

Step 4 : Look For An Address

Genuine seafood vendors on Facebook will share with you their address, so you can drop by and select your seafood if you wish.

But don’t just trust the address they post. Always check the address on Google Maps, and use Street View to check if the shop really exists.

Step 5 : Look For Angry Emojis

A genuine seafood vendor may have one or two angry emojis by dissatisfied customers, but scam pages will have A LOT of them.

Hover over the reaction emojis, and look at how many are positive (likes or wow), and how many are negative (angry).

Scam pages will have a lot of angry emojis because they often delete negative comments, so angry customers have only one option – show angry emojis to warn potential customers.

Step 6 : PM People With Angry Emojis

To find out for sure if this is a scam, just PM (private message) those who left an angry emoji react to the Facebook page.

That’s how we were able to confirm that Ocean Sense and East Malaysia Seafood Agent are seafood scam pages.

Step 7 : Pay Only By Credit Card / Cash On Delivery

If you are still enticed by the great offer and want to take a risk, insist on paying with a credit card, or cash on delivery.

NEVER PAY to a bank account directly, because there is simply NO PROTECTION, and NO WAY for you to get your money back.

Using a credit card protects you against fraud, because the payment is not instantly credited to the vendor.

If you did not receive the seafood you ordered, simply call up the bank and inform them. They will refund the money.

If the seafood vendor insists on a direct bank transfer and refuses even cash on delivery, it is highly likely that they are scammers.

 

Recommended Reading

Go Back To > Scam Alerts | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

USS Al Gore Global Warming Research Vessel Frozen In Ice?

Did the USS Al Gore Global Warming Research Vessel get frozen in ice?

Take a look at the pictures, and find out what the facts really are!

 

USS Al Gore Global Warming Research Vessel Frozen In Ice?

People keep sharing pictures of the USS Al Gore Global Warming Research Vessel frozen in ice, some as a joke, some as evidence that global warming does not actually exist.

You will find these being shared on Facebook, Twitter, WhatsApp, Reddit, and even some websites.

Note : We intentionally placed the FALSE overlay to prevent them from being further abused.

Because these have been debunked previously on our sister website, someone started sharing a new picture instead. This time, of a much larger ship.

 

USS Al Gore : The Facts

As you can surmise by now, those pictures are NOT of the USS Al Gore Global Warming Research Vessel.

Climate change is real, and sharing pictures of frozen boats is not going to change the fact that the world is getting warmer.

Here are the reasons why these are all FAKE PICTURES being shared by climate change deniers.

Fact #1 : There Is No USS Al Gore

The USS Al Gore does not exist. The USS (United States Ship) designation is reserved for active commissioned ships of the US Navy. There has never been a ship named for former US Vice-President Al Gore.

Well, a FICTIONAL submersible aircraft carrier – the CVJ-01 USS Al Gore – was named after him, but I don’t suppose that counts… because it’s a SUBMARINE! 😀

Fact #2 : Al Gore Has A Houseboat Called Bio-Solar One

Al Gore has a 100-foot houseboat that is powered by bio-diesel and solar panels, called Bio-Solar One. It was launched sometime in September 2008.

Here, you can see it at the Hurricane Marina in Silver Point, Tennessee. Completely different design and size, and NEVER FROZEN in ice.

Photo Credit : The Tennessean

Fact #3 : The Frozen Boat Was In Switzerland

The original fake picture of USS Al Gore was of a boat moored off Versoix, on the shores of Lake Geneva, Switzerland.

It was hit by an ice storm in 2005 – the freezing rain froze into a thick glaze of ice that covered not only this boat, but also vehicles, buildings and the streets.

This photo of the same boat was taken by a different photographer, Santiago Puig Viladomiu.

The date stamp is clear – this was taken on 28 January 2005 – more than 3.5 years before Al Gore’s Bio-Solar One houseboat was even launched.

Fact #4 : The Frozen Ship Was In Russia

The newer fake photo of USS Al Gore was really taken on 19 January 2006, of the ship GEORG OTS at the port of Saint Petersburg in Russia.

GEORG OTS (IMO 7625835) is a passenger Roll-On, Roll-Off (Ro-Ro) cargo ship built in 1980, and has ceased service since 2013, last seen heading to Zhoushan, China.

Here you can see the original picture used in the fake USS Al Gore photo, and the GEORG OTS during warmer times.

 

Recommended Reading

Go Back To > Fact Checks | ScienceHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Illegal Bitcoin Cryptomining Operation Seized!

The Pahang police and TNB SEAL team just busted and seized an illegal cryptomining operation, and arrested a suspect there!

 

Illegal Bitcoin Cryptomining Operation Seized!

On 9 February 2021, the Pahang police D7 JSJ team and the TNB SEAL team (seriously, that’s what they call themselves) busted and seized an illegal Bitcoin cryptomining operation.

The Bitcoin cryptomining operation occupied two shoplots in a three storey building at Batu 3, Jalan Gambang in Kuantan, Pahang.

The police also arrested a suspect who was found at the cryptomining operation.

According to the Pahang Deputy Chief of Police Dato’ Mohd Yusri bin Hj. Hassan Basri, the suspect had illegally tapped into the electricity at both premises, and will be investigated under :

  • Section 379 of the Penal Code for stealing electricity
  • Section 427 of the Penal Code for committing treason

We should point out that cryptomining is not illegal in Malaysia, whether it’s for Bitcoin or any other cryptocurrency.

What’s illegal is the theft of electricity to run such cryptomining operations for maximum profit.

That’s why the TNB SEAL team was involved, and not just the police.

 

More Pictures From The Illegal Cryptomining Operation Raid

 

Recommended Reading

Go Back To > ComputerBusiness | Home

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


CD PROJEKT RED Hack : Source Codes + Docs Stolen!

CD PROJEKT RED just had their source codes and internal documents stolen in a MAJOR HACK, and they may all end up being leaked!

 

CD PROJEKT RED Hack : Source Codes Stolen, Servers Encrypted!

On 9 February 2021, CD PROJEKT RED announced that their data – including source codes and internal documents – were stolen in a hack, and could possibly be leaked.

Their servers were also encrypted in a secondary ransomware attack by the same hackers, but they had backups of the encrypted data.

CD PROJEKT RED publicly ruled out negotiating with the hackers, or giving in to their demands.

This would likely mean that their source codes and internal documents will eventually be released publicly by the hackers.

The only silver lining – CD PROJEKT RED noted that they do not have any evidence that the personal data of their employees were accessed or stolen.

 

CD PROJEKT RED Hack : The Hackers’ Threats

According to the ransom note left on their servers, the hackers stole :

  • FULL source codes for Cyberpunk 2077, Witcher 3, GWENT and the unreleased version of Witcher 3.
  • ALL of their internal documents on accounting, administration, legal, HR, investor relations and more

They also encrypted all of their CD PROJEKT RED’s servers, but acknowledged that they would most likely recover the data from their backups.

The hackers are giving the CD PROJEKT RED team 48 hours to contact them to negotiate.

If there is no agreement, they threaten to sell or leak the source codes, and release their internal documents to the media.

They claim that the internal documents will make CD PROJEKT RED look bad, causing their stock prices to fall and their investors will lose trust in them.

 

CD PROJEKT RED : Official Statement On Hack

This is the official statement by CD PROJEKT RED on the hack :

Yesterday we discovered that we have become a victim of a targeted cyber attack, due to which some of our internal systems have been compromised.

An unidentified actor gained unauthorized access to our internal network, collected certain data belonging to CD PROJEKT capital group, and left a ransom note the content of which we release to the public. Although some devices in our network have been encrypted, our backups remain intact. We have already secured our IT infrastructure and begun restoring the data.

We will not give in to the demands nor negotiate with the factor, being aware that this may eventually lead to the release of the compromised data. We are taking necessary steps to mitigate the consequences of such a release, in particular by approaching any parties that may be affected due to the breach.

We are still investigating the incident, however at this t time we can confirm that – to the best of our knowledge – the compromised systems did not contain any personal data of our players or users of our services.

We have already approached the relevant authorities, including law enforcement and the President of the Personal Data Protection Office, as well as IT forensic specialists, and we will closely cooperate with them in order to fully investigate the incident.

 

Recommended Reading

Go Back To > Cybersecurity | Games | SoftwareHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Fact Check : Dr Noor Hisham Tendered His Resignation?

A WhatsApp message has gone viral, claiming that Dr Noor Hisham has tendered his resignation!

Take a look at the WhatsApp message, and find out what the facts really are!

 

Viral Claim : Dr Noor Hisham Has Tendered His Resignation!

This is the WhatsApp message that has gone viral, claiming that Dr Noor Hisham has tendered his resignation!

FINALLY DR NOOR HAS PUT HIS FOOT DOWN.
THE DAILY FIGURES FOR COVID 19 ARE BACKLOG FROM LAST YEAR.\
THE REASON BEING THE PRIME MINISTER AND TWO MINISTERS ARE KEEN TO CONTINUE THE RISE TO JUSTIFY THE BLUNTED IN RUNNING THE NATION.
THEY WANT TO CONTINUE STAYING IN THEIR POSITION.
I AM NOT SURE WHY ALL THE SULTANS ARE KEEPING MUM ON THIS.

THE ACTUAL FIGURE IS LESS THAN 100 DAILY SINCE EARLY JANUARY 2021.

IT IS TIME LIKE THIS THAT EVERYONE USE THEIR COMMON SENSE WHY PASAR MALAM IS ALLOWED TO RUN FROM 4PM TO 10PM AND KINDERGARTEN HAS BEEN ON WHILE THE REST ARE ON MCO.

AFTER THE ANNOUNCEMENT EXTENSION TO 16TH FEBRUARY 2021, THE MINISTER WENT TO HIS PENTHOUSE TO HAVE A CELEBRATION. ALL 13 OF THEM DID NOT FOLLOW SOCIAL DISTANCING NOR WEAR A MASK.

WHILE A TRIP TO BUY ESSENTIALS GOODS WAS GIVEN SUMMONED.

Villagers fined for trip to Tenom to get essential supplies
TODAY ANYONE CAUGHT WILL BE FINE RM10,000 WHILE MINISTERS ARE ABOVE THE LAW.

IT IS TIME LIKE THIS THAT MALAYSIANS WISH SOMETHNG DRASTIC IS DONE TO STOP THE DOUBLE STANDARD.

It is actually a copy and paste of a MalaysiaFlipFlop blog post.

 

Dr Noor Hisham Tendered His Resignation? Nope!

The Malaysia Ministry of Health and Dr. Noor Hisham Abdullah himself has called the post fake news, denying that he tendered his resignation.

We should also point out that the MalaysiaFlipFlop post is factually wrong in a couple of instances :

Fact #1 : Only Some Cases Are From Last Year

While MalaysiaFlipFlop claims that COVID-19 daily figures are from last year, that is only true for a few cases.

On 31 January, 2021, the Director General of Health, Dr Noor Hisham Abdullah, said that the recent surge of over 5,000 daily cases was partly due to a backlog, and partly due to targeted screening at work places, and screening of high-risk groups.

Fact #2 : Over 2000 New Daily Cases Since January 2021

Since 1 January 2021, Malaysia has reported over 2,000 new cases every day, hitting a record 5728 cases on 30 January 2021.

Not once has it dropped anywhere close to “less than 100 daily” cases that MalaysiaFlipFlop suggested.

Fact #3 : MCO Was Extended To 18 February 2021

The MCO was extended to 18 February 2021, not 16 February as MalaysiaFlipFlop claimed.

Fact #4 : Fine For Breaking MCO Rules Only RM1,000

The fine for breaking MCO rules is only RM1,000 per offence, not RM10,000 as MalaysiaFlipFlop claimed.

 

Recommended Reading

Go Back To > Cybersecurity | SoftwareHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Ministry of Education Website Uses Plain Text CAPTCHA!

It is unbelievable, but the Malaysia Ministry of Education’s website uses plain text CAPTCHA that can be copied and pasted!

Take a look at this incredulous security lapse, and find out why it could put your data at risk!

 

Ministry of Education Website Uses Plain Text CAPTCHA!

The recent threat by Anonymous Malaysia to attack government websites over their lack of security appears to be well-justified.

Qusyaire Ezwan spotted an incredulous security lapse in the official Malaysia Ministry of Education website – plain text CAPTCHA!

On top of that, the code can actually be copied and pasted!

 

Ministry of Education Plain Text CAPTCHA : A Serious Cybersecurity Risk!

The CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) test is something most of us are familiar with.

It is a test that helps to identify real humans, and weed out bots, before they are allowed to access a service. This prevents bot fraud and hacking attempts.

In the Ministry of Education website, the plain text CAPTCHA was used to “secure” the retrieval of forgotten passwords for their Student Management Module.

A real CAPTCHA uses distorted images to prevent a bot from “reading” the numbers or letters, thereby ensuring that only a real human being would be able to key in the correct code.

As this screenshot shows, the CAPTCHA used in the Ministry of Education website just uses random sequences of letters and numbers in PLAIN TEXT!

This means a bot can easily copy and paste the plain text code, and bypass the CAPTCHA test.

Frankly, this doesn’t even qualify as a CAPTCHA test, because it cannot differentiate between humans and bots.

Now, the password is still sent to the registered email accounts, not to the hackers or bots. So your data is not in immediate danger.

However, this is still a SERIOUS cybersecurity risk, because a hacker can pair this design flaw with compromised email accounts.

It would allow their bots to easily and quickly make password retrieval requests for compromised email accounts, and then retrieve your Ministry of Education password.

Having access to the Student Management Module would give hackers access to a ton of information on children and their parents :

  • child : name, date of birth, telephone number, home address
  • school : location, class name, teacher’s name,
  • parent : name, occupation, workplace address, contact number, declared salary

On top of that, many people reuse their passwords, so hackers will use the password retrieved from the Ministry of Education website on other websites and online services you may use.

If you use the same password for your banking account, for example, that would expose your banking account to the hacker.

That is why CAPTCHA is important. It doesn’t prevent hacking attempts, but it greatly slows it down by blocking bots from making mass requests.

The use of plain text CAPTCHA in an official government website is a fiasco. A basic cybersecurity checklist would have prevented software vendors from using plain text CAPTCHA in government websites.

The Malaysian government needs to take the security of official websites seriously. This is a disgrace.

 

Recommended Reading

Go Back To > Cybersecurity | SoftwareHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Scam Alert : East Malaysia Seafood Agent On Facebook!

There is another seafood scam page on Facebook called East Malaysia Seafood Agent (海鲜海产代理 or 东马海产代理)!

Please SHARE this scam alert, and help bring down that scam page!

 

Scam Alert : East Malaysia Seafood Agent On Facebook!

Please be warned that there is another seafood scam page on Facebook called East Malaysia Seafood Agent (海鲜海产代理 or 东马海产代理)!

It is related to Ocean Sense, another seafood scam page on Facebook.

Like Ocean Sense, East Malaysia Seafood Agent offers fresh and frozen seafood at very attractive prices, with free delivery and discounts for large purchases :

Cannada lobster
加拿大波士顿龙
Sex : mix
Size : 1.5 – 6 kg per 1
Price : 78 per kg
Take over 10KG free shipping
10公斤以上包邮

Alaska King crab fresh and huge
阿拉斯加 帝王蟹
Sex : mix
Size : 2 – 5 kg per 1
Price : 88 per kg
Take over 10KG Free Shipping
10公斤以上免邮

PM and message us for more details
Contact : 016 868 6538 Ah Yap

However, one of our readers confirmed that he was cheated by this vendor, and he shared with us the details of what happened.

Noticeably, the vendor behaved very similarly to Ocean Sense, replying in PM and deleting negative comments. That’s why the page has many Angry reacts, by people who were blocked from commenting.

 

East Malaysia Seafood Agent Scam : What Happened?

This customer ordered a large quantity of lobsters and Alaska king crabs from East Malaysia Seafood Agent, and was told to bank the money to :

Yap Kok Keong
CIMB 7634-371-328

This is the EXACT SAME person and bank account for Ocean Sense!

We checked the CIMB account number with the Commercial Crimes Department’s website, which showed that no report has been lodged against it… yet.

However, it doesn’t mean it is a safe account. At least 61 people have looked up the same number.

Oddly enough, when he asked for the bank account for the company (whose SSM record he furnished above), he issued him an invoice at a different company, and told him to bank it into “his relative’s company” instead :

Car Boutique Venture
CIMB 8604-5267-74

We checked the CIMB account number with the Commercial Crimes Department’s website, which showed that no report has been lodged against it… yet.

However, it doesn’t mean it is a safe account. At least 19 people have looked up the same number.

By this time, he was very suspicious, and decided to take a small gamble.

He said that he would bank a deposit of RM 200 into that Yap Kok Keong personal account, and pay the remainder on delivery.

As expected, he never delivered the seafood and then ghosted this customer.

 

Help REPORT East Malaysia Seafood Agent On Facebook!

Even though he reported East Malaysia Seafood Agent page as a scam to Facebook, the page is still active, and the person running this page is actively deleting negative comments.

Here is how you can help prevent more people from being scammed.

Step 1 : Report To The Police!

If you are one of those who were scammed, please report to the police ASAP.

This would help get the bank accounts blacklisted, and listed in the Commercial Crimes Department’s database.

Step 2 : Publicise The Scam!

Share this article, or the news about East Malaysia Seafood Agent, with your family and friends.

Alert your community via social media – Facebook, Twitter, WhatsApp, Telegram, etc.

Step 3 : Report The Scam To Facebook!

Facebook is quite lax about scams. They need many people to report a page as a scam before they will even bother to take action.

So follow these steps to report the East Malaysia Seafood Agent Facebook page as a scam.

  1. Go to the East Malaysia Seafood Agent Facebook page.
  2. Tap on the … menu on the upper right corner.
  3. Select Find support or Report Page.

  1. Select Fraud or Scam and Other.
  2. Click Next.

  1. Select Report Page.

  1. Tick the I believe that this goes against Facebook’s Community Standards check box.
  2. Click on the Report button.

That’s it! You have done your part in reporting a scammer.

But for this to work, many more people must report the page as a scam. So please share this out, and get your family and friends to help report them.

Facebook is very lax, and will likely claim that the page doesn’t contravene their Community Standards. But without enough reports, they will take it more seriously.

 

Recommended Reading

Go Back To > Scam Alerts | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Scam Alert : Ocean Sense Seafood On Facebook!

A new seafood scam page on Facebook called Ocean Sense have already scammed several people!

Please SHARE this scam alert, and help bring down that scam page!

Note : There is a similar scam, involving the same person and bank account. See this article for more details!

 

Scam Alert : Ocean Sense Seafood On Facebook!

Please be warned that several people have allegedly been scammed by Ocean Sense – a seafood vendor on Facebook.

Ocean Sense offers fresh and frozen seafood at very attractive prices, with free delivery and discounts for large purchases :

Shipping fee 25
Take over rm300 free shipping
Take over rm500 10% discount (Each item )

Alaska king crab frozen
MYR 80 size – S (800g-1.5kg)
MYR 90 size – M (2kg -3.5kg)
MYR 100 size – L (4kg-5.5kg)
___________________________

Alaska king crab live
MYR 100 size – S (800g-1.5kg)
MYR 135 size – M (2kg-3.5kg)
MYR 170 size – L (4kg -5.5kg)
___________________________

Canada lobster live
MYR 75 size – S (1kg-2.5 kg)
MYR 85 size – M (3kg -4.5kg)
MYR 95 size – L (5kg -6.5kg)
_____________________________

Snow crab live
MYR 89 per kg 1-3kg per pic

However, several customers reported that the vendor would block them after receiving payment, and delete any negative comments on their page.

SCAMMER ALERT

“OCEAN SENSE” – seafood supplier.

Do not purchase from this vendor. It is a scam. Blocks purchasers from FB/FB messenger and mobile number after monies for orders are banked into his account.

FB business name: Ocean Sense
Vendor / Acc name: Yap Kok Keong
Payment Account: CIMB 7634-3713-28

Be careful with online purchases during this depressed period of time!

We checked the CIMB account number with the Commercial Crimes Department’s website, which showed that no report has been lodged against it… yet.

However, it doesn’t mean it is a safe account. At least 61 people have looked up the same number.

In fact, a similar East Malaysia Seafood Agent page is also using the same CIMB bank account owned by Yap Kok Keong!

Another Ocean Sense customer just shared screenshots of his interaction with the same vendor, who used a different bank account :

A&B Bintang Trading
CIMB 8604-5038-34

After paying Ocean Sense RM500, he was told that seafood he purchased would arrive at 11 AM. But there was no sign of it at 12 PM, which was when the buyer realised he was cheated.

According to the Commercial Crimes Department’s website, this CIMB bank account had two police reports lodged against it.

You should AVOID dealing with A&B Bintang Trading, and definitely DO NOT send money to CIMB 8604503834.

If you have been cheated by this company, please LODGE A REPORT at the nearest police station!

We reached out to Ocean Sense, and after some digging, they claim that they are based in Tawau, and that their customers can purchase seafood from them at this address :

Ocean Sense
1st Block, Batu 13,
Jalan Airport
91000 Balung,
Tawau,
 Sabah

Contact : Tommy Tan
Tel. : 010-775-9395

However, there is no Jalan Airport in Tawau, and Jalan Airport Baru is just an empty road leading to the Tawau Airport.

 

Help REPORT Ocean Sense Seafood On Facebook!

Even though these customers have reported Ocean Sense as a scam to Facebook, the page is still active, and the person running this page is actively deleting negative comments.

Here is how you can help prevent more people from being scammed.

Step 1 : Report To The Police!

If you are one of those who were scammed, please report to the police ASAP.

This would help get the bank accounts blacklisted, and listed in the Commercial Crimes Department’s database.

Step 2 : Publicise The Scam!

Share this article, or the news about Ocean Sense, with your family and friends.

Alert your community via social media – Facebook, Twitter, WhatsApp, Telegram, etc.

Step 3 : Report The Scam To Facebook!

Facebook is quite lax about scams. They need many people to report a page as a scam before they will even bother to take action.

So follow these steps to report the Ocean Sense Facebook page as a scam.

  1. Go to the Ocean Sense Facebook page.
  2. Tap on the … menu on the upper right corner.
  3. Select Find support or Report Page.

  1. Select Fraud or Scam and Other.
  2. Click Next.

  1. Select Report Page.

  1. Tick the I believe that this goes against Facebook’s Community Standards check box.
  2. Click on the Report button.

That’s it! You have done your part in reporting a scammer.

But for this to work, many more people must report the page as a scam. So please share this out, and get your family and friends to help report them.

Facebook is very lax, and will likely claim that the page doesn’t contravene their Community Standards. But without enough reports, they will take it more seriously.

 

Recommended Reading

Go Back To > Scam Alerts | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Beware Of AirAsia X Scam On WhatsApp!

AirAsia X is warning about a scam on WhatsApp that is trying to trick people into making payments.

Please watch out for this scam, and WARN your family and friends!

 

Beware Of AirAsia X Scam On WhatsApp!

There is a new scam on WhatsApp involving AirAsia A.

Scammers pretending to be AirAsia X are sending messages on WhatsApp, asking people to make a payment into an account allegedly belonging to a credit management company.

AirAsia X announced that neither they nor their employees are involved with that scam.

Just like banks, AirAsia X will NOT engage with customers, or solicit payments through any instant messaging apps like WhatsApp.

All official AirAsia X announcements are made through the mass media, or these official channels on social media :

Twitter: www.twitter.com/airasia
Instagram: www.instagram.com/airasia
Facebook: www.facebook.com/airasia

 

Other Scams To Watch Out For

Other than this new AirAsia X scam on WhatsApp, please watch out for these scams too :

Go Back To > Cybersecurity | TravelHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Why You Should NOT Move WhatsApp Chats To Telegram!

Telegram just highlighted the ability to migrate WhatsApp chats to their app, but you really should NOT do that.

Find out why this is a BIG security and privacy risk than just leaving your chats in WhatsApp!

 

Telegram : Moving Chat History From WhatsApp, Line + KakaoTalk

In a recent version 7.4 update for their iOS app, Telegram announced a new feature – the ability to move your chat messages from other apps like WhatsApp, Line and Kakaotalk to their app.

Curiously, that ability has actually been part of WhatsApp since 2018, when they introduced the ability to export chats to email and other apps.

And while this feature is purportedly available only with the iOS version of Telegram Messenger, you can already do that with existing versions of WhatsApp and Telegram.

 

Why You Should NOT Move WhatsApp Chats To Telegram!

You should note that the privacy risks with WhatsApp have been grossly exaggerated by the media and many Internet “experts”.

For one thing – WhatsApp users have been sharing metadata with Facebook since September 2016, a fact initially lost on many media outlets and “experts”.

But we understand the fear – Facebook is a real snoop. Even so, it would be a mistake to migrate from WhatsApp to Telegram.

Let us share with you why you should NOT migrate from WhatsApp to Telegram, and why it is a BIG mistake to migrate your WhatsApp data to Telegram.

Fact #1 : Telegram Is LESS Secure Than WhatsApp

WhatsApp fully implemented end-to-end encryption across all of their apps and network since 5 April 2016.

End-to-end encryption prevents WhatsApp or Facebook from reading your messages. Only the sender and receiver(s) can read them.

WhatsApp shares a considerable amount of data and metadata that Facebook can use to identify and track your movements and activities. But not the content of your messages.

Telegram, on the other hand, has STILL NOT implemented end-to-end encryption for all messages by default.

Instead, they still insist on offering end-to-end encryption only when you create a Secret Chat.

This leaves the bulk of your messages completely readable by Telegram and anyone who intercepts those messages as they travel from your device through the Internet to the recipient.

The very presence of Secret Chats between certain people is itself metadata that can help oppressive regimes identify their enemies or whistleblowers.

Fact #2 : Your Data Is Stored In Telegram Cloud Servers

All WhatsApp data is stored only in your registered device. WhatsApp also does not retain messages in their servers after they are delivered, and will only store files (like photos and videos) and undelivered messages for 30 days.

It’s the opposite with Telegram – all of your data – messages, photos, videos, documents – is stored in their cloud servers. Even though they are encrypted in storage, Telegram holds the encryption keys, NOT YOU.

This ability has its advantages like convenient access across multiple devices, but it also makes Telegram less secure.

Telegram has access to your encrypted files, including the ability to decrypt them for authorities that legally compels them to do so.

Fact #3 : Moving Your Messages + Media To Telegram Exposes Them

While your chats and media remain within your WhatsApp app, they are encrypted and not available to anyone but yourself (and the recipients).

Migrating your chat messages and media to Telegram would involve sending them unencrypted to Telegram’s servers.

This exposes your hitherto secure chats and media to a man-in-the-middle attack – allowing a third party to snoop or grab a copy of the data as it travels unencrypted to the Telegram servers.

Fact #4 : Facebook Already Has Your Metadata

As we pointed out earlier, WhatsApp has been sharing our metadata with Facebook since September 2016.

So moving your existing chats out of WhatsApp won’t limit or reduce your exposure. That horse has long bolted from the stable.

Moving your chat history and files to Telegram will just offer a new attack surface for cybercriminals and oppressive regimes.

Fact #5 : Facebook Will Still Have Your Data If You Still Use Facebook!

Here is the other thing that people don’t realise – migrating from WhatsApp to another messaging app is pointless if you do not also stop using Facebook.

As long as you still use Facebook, they will still have access to a consideration amount of metadata. Losing your WhatsApp metadata just gives them less metadata.

After all, Facebook can track your movements and activity even if you are NOT on Facebook! This is what they call Off-Facebook Activity.

 

Recommended Reading

Go Back To > Cybersecurity | SoftwareHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

HUAWEI New Year Gift Scam : Don’t Click Or Share!

Watch out for the HUAWEI New Year Gift scam that’s circulating on WhatsApp!

Do NOT click or share. Just delete it, and WARN YOUR FAMILY AND FRIENDS!

 

HUAWEI New Year Gift Scam : Do NOT Click Or Share!

Scammers are sending out this message on WhatsApp, claiming that HUAWEI is giving away New Year gifts.

Please do NOT click on the message, or share it. Just delete it and warn your family and friends!

 

Why This HUAWEI New Year Gift Offer Is A Scam

Let us show you why this HUAWEI New Year Gift offer (and similar offers) is just a scam.

If you spot any of these warning signs, BACK OFF and DO NOT PROCEED!

Warning Sign #1 : Not Using The Real HUAWEI Domain

A genuine HUAWEI campaign would use the real HUAWEI domain – www.huawei.com.

The use of a different domain (2021-whatsapp3w.bar) should warn you that this is not a legitimate HUAWEI website.

Warning Sign #2 : HUAWEI Does Not Give Away Free Gifts

HUAWEI is a for-profit corporation whose goal is to make money, not give it away.

They are not a charity, and will never give free gifts to celebrate a new year, or anniversary.

They only give free gifts to promote the purchase of their latest products.

Warning Sign #3 : Ridiculous Prizes

While brands may sometimes give away branded swag like a face mask, a t-shirt, or a cap; they will NEVER give away CASH as a prize.

And there is no way they would give away US$5,000 cash prizes. That’s just nuts! It should be cheaper to just give away one of their latest Mate 40 Pro smartphones.

 

Recommended Reading

Go Back To > Cybersecurity | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Maybank B40 Subsidy Scam : Do NOT Click Or Call!

Watch out for the new Maybank B40 subsidy scam! It is a phishing attack to gain access to your Maybank account!

Do NOT click or call. Just delete it, and WARN YOUR FAMILY AND FRIENDS!

 

Maybank B40 Subsidy Scam : Do NOT Click Or Call!

Scammers are sending out this SMS claiming that Maybank (MBB) will issue the B40 subsidy after you fill in some information.

Please do NOT click on the message, or call the telephone number. Just delete it and warn your family and friends!

 

Why This Maybank B40 Subsidy Offer Is Just A Scam

Let us show you why this Maybank B40 subsidy offer (and similar offers) is just a scam.

If you spot any of these warning signs, BACK OFF and DO NOT PROCEED!

Warning Sign #1 : No Such B40 Subsidy Program

The Malaysian government has not announced any B40 subsidy program.

Neither would Maybank offer free money for the B40. It’s a bank, not a charity.

Warning Sign #2 : Bad Grammar

The bad English grammar should be a warning sign that this is not a legitimate offer.

Warning Sign #3 : Not Using The Real Maybank Domain

A genuine Maybank campaign would use the real Maybank domain – www.maybank.com.my.

The use of a different domain should warn you that this is not a legitimate Maybank website.

In fact, Google Chrome will warn you that this website is a phishing attack – to get your personal and banking information.

Warning Sign #4 : Asking You For Your Information

The banks – whether they are Maybank, Public Bank, CIMB, etc – will NEVER ask you to fill in your personal details.

Think about it – they already have your information because you have an account with them!

Even if there is a legitimate B40 subsidy programme, they only need you to log into your Maybank account. They do NOT need you to register your details again.

These scammers ask you for these details so they can use them in phishing calls, to convince you that they are really from Maybank.

Warning Sign #5 : Asking You For Your Bank Login!!!

This is a BIG warning sign. Banks will NEVER ask you for your user name and password.

If you key in this information, you are basically giving these scammers access to your Maybank account.

They will call or message you and try to get your TAC (Transaction Authorisation Code) number that is sent to your mobile number. DO NOT GIVE THAT TO THEM!

If you sent them your user name and password, please contact the bank immediately, and change your password!

 

Recommended Reading

Go Back To > Cybersecurity | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Tesco New Year Scam Alert : Do NOT Click / Forward!

Now that the New Year is almost here, the Tesco New Year Scam is going viral on WhatsApp!

Do NOT click on the message if you receive it. Do NOT forward it either!

Just delete it, and WARN YOUR FAMILY AND FRIENDS!

 

Tesco New Year Scam Alert : Do NOT Click / Forward!

People are sharing this Tesco New Year promotion that claims to offer a gift card valued up to RM1000, but it is really nothing more than a SCAM!

Please do NOT click on the message, or forward it to anyone. Just delete it and warn your family and friends!

 

Why This Tesco New Year Offer Is Just A Scam

Let us show you why this Tesco New Year gift card offer (and similar offers) is just a scam.

If you spot any of these warning signs, BACK OFF and DO NOT PROCEED!

Warning Sign #1 : Bad Grammar

Most of these Tesco gift card scams have bad grammar (example #1, example #2), which is a big clue that this isn’t a genuine Tesco offer.

In this example, they capitalised TESCO and use the grammatically incorrect “win up to RM1000 Tesco Gift Card!

Warning Sign #2 : Offering You Free Money Or Gifts

Please do NOT be naive. Nothing is FREE in this world, much less a RM1000 gift card.

Tesco isn’t going to give you FREE money, just because it’s the new year, or their anniversary.

They are a corporation whose business is to make money, not a charity to give you free money.

Warning Sign #3 : Not Using The Real Tesco Domain

A genuine Tesco Malaysia campaign would use the real Tesco Malaysia domain – www.tesco.com.my.

Or they would run it off the official Tesco Malaysia page on Facebook – www.facebook.com/TescoMY.

This scam is using a BlogSpot.com domain – which is not something any genuine company would do.

Warning Sign #4 : Asking You To Forward The Offer

No brand will insist that you must share the offer with 5 groups or 20 friends on WhatsApp.

Do not click to forward their offer to your family and friends. They will not appreciate being scammed with your help!

Warning Sign #5 : Asking You To Download + Register An App

If you click through and joined the fake survey scam, you will eventually be asked to download and register for an app.

That is VERY DANGEROUS. Never agree to download and register for any unknown app from a website.

Always download your apps from an official App Store like Google Play Store (for Android smartphones) and Apple App Store (for iPhones).

 

Recommended Reading

Go Back To > Cybersecurity | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Did Alabama Nurse, Tiffany Dover, Die From Pfizer Vaccine?

Antivaxxers are claiming that an Alabama nurse, Tiffany Dover, died on live TV after taking the Pfizer-BioNTech COVID-19 vaccine!

Find out what’s going on, and what the facts really are!

Updated @ 2020-12-25 : Added more fact checks, because antivaxxers continue to post fake claims about Tiffany. It’s Christmas, for crying out loud!

Originally posted @ 2020-12-23

 

Did Alabama Nurse, Tiffany Dover, Die From Pfizer Vaccine?

There are several versions of this story, but they basically boil down to two main storylines :

a) an unnamed Alabama nurse died on live TV after taking the Pfizer-BioNTech COVID-19 vaccine!

COVID 19 -TEST A nurse in Alabama dies directly on the air after taking the Pfizer vaccine for Corona This is clear evidence of the danger of the vaccine, including the toxins and animal genes .. LOOK AT VEDIO CLIP!

b) a Tennessee nurse, Tiffany Dover, died after fainting on live TV (after taking the Pfizer-BioNTech COVID-19 vaccine)

OMFG! FAINTING NURSE DIED
Tiffany Dover IS DEAD

I saw that fainting nurse died, so I checked it out!
This death record has to be her! Same town, age, and most importantly, the family listed all show up as her friends on fb!

So the nurse who took the COVID-19 vaccination on live television is now dead days after being vaccinated..

 

No, Tiffany Dover, Did NOT Die From Pfizer Vaccine!

The short and sweet summary is this – no nurse died after taking the Pfizer vaccine, whether on live TV or otherwise.

For the skeptics who are fond of asking, “How do you know? Were you there?”, here are the facts…

Fact #1 : No Nurse Died On Live TV In Alabama

Despite claims that an unnamed nurse died in Alabama after being injected with the Pfizer COVID-19 vaccine, that is not true.

The claim was shared with the video of Tiffany Dover, a nurse in Tennessee, fainting on live TV after receiving her Pfizer vaccination.

It is likely that antivaxxers intentionally switched the location from Tennessee to Alabama, to mislead those who already knew about Tiffany Dover.

Fact #2 : Tiffany Dover Is Alive And Well!

According to the NewsChannel 9 ABC crew who recorded the whole event on 17 December 2020, Tiffany Dover quickly recovered, and within minutes, was able to get up and speak with them again.

While antivaxxers are claiming that she subsequently died, those are complete lies. She did NOT die.

In fact, her hospital – CHI Memorial – posted this tweet, confirming that she is well, asking that people give her and her family privacy.

Fact #3 : Tiffany Dover Alive And Well On Video, 4 Days Later!

On 21 December 2020, CHI Memorial followed up with a short video showing that she is alive and well, surrounded by her colleagues.

To prove that it was not filmed before her vaccination and alleged “death”, they held up banners that said, “Nursing Leadership Vaccinated Together, #CHIMemorialStrong” and the date “12-21-20“.

Fact #3 : People Found The Wrong Death Record

Conspiracy theorists and antivaxxers are parading online search results showing her death record.

In fact, Kitty Lynn in this example searched for Tiffany Dover in the wrong state – Alabama. Is it any wonder she got the wrong death record?

Note : We intentionally added the HOAX overlay, to prevent it from being misleadingly shared

And this intrepid online investigator discovered that he/she was also listed on searchquarry.com.

Funnily enough, herdsheeple thought that SearchQuarry lists only dead people. It’s actually a search engine for public records in the United States.

With fantastic investigators like herdsheeple and Kitty Lynn, who needs the FBI?

Fact #4 : Tiffany Dover Is Not A Unique Name

As unique as Tiffany Dover surely is as a person, her name isn’t unique.

In the entire US, there are currently 47 Tiffany Dovers, with nine of them in Tennessee. And no, they are NOT CLONES, as some people are alleging.

And they do not include Tiffany Dovers who have actually passed away years or even decades ago.

Fact #5 : No Animal Genes In mRNA Vaccines

Some of these messages include the claim that the Pfizer COVID-19 vaccine contains animal genes, that’s completely false.

There are no genes of any sort in mRNA vaccines, whether they are from Pfizer or Moderna.

The mRNA in these COVID-19 vaccines are merely RNA instructions – coding for the SARS-CoV-2 spike proteins. That’s it.

Recommended : Pfizer + Moderna mRNA Vaccines : How Do They Work?

 

Recommended Reading

Go Back To > Fact Checks | ScienceHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Fake CIMB SMS Scam! Do NOT Click / Call!

Fake SMS scammers just switched from Public Bank to CIMB.

Do NOT click or call if you receive any of these fake SMS messages!

And please warn your family and friends!

 

Fake CIMB SMS Scam! Do NOT Click / Call!

Whether you are a CIMB Bank customer or not, you may receive one of these alarming SMS messages :

RM 0.00 CIMB: Confidential!

Dear CIMB users, your account will TERMINATED on 24/12/20. Verify via http://www.cimbclickikm.cc to keep on using CIMB Clicks services.

Please make verification within 24hours to avoid service interruption.

RM0 CIMB: Instant Transfer RM4998.78 to CHAY LEE FEN/HONG LEONG on 23-Dec-2020, 13:06:35. Call the no. at the back of your card for queries.

If you receive any of these SMS messages, please DO NOT click on the link, or call the number. JUST IGNORE THEM, or delete them.

Note : These scams do not just affect CIMB Bank. In fact, all banks are affected :

 

Why These CIMB SMS Messages Are Fake

Let us show you how to identify these fake CIMB SMS messages.

If you spot any of these warning signs, BACK OFF and DO NOT PROCEED!

Warning Sign #1 : Grammatical Mistakes

If you carefully read the first SMS message above, you can easily spot numerous grammatical mistakes. A bank will never send such poorly worded messages to their customers.

The second SMS message has proper grammar, and is likely a copy of the real SMS message to trick you into thinking that this is a real transaction.

Warning Sign #2 : Embedded Links

Banks will NEVER embed links (URLs) into the message. If you see embedded links, always think – SCAM SMS!

Unlike the Public Bank SMS scam, they used a copy of the real SMS message to trick you into clicking the URL in the first message.

Warning Sign #3 : Wrong Links

And always check the link – www.cimbclickikm.cc is not the correct address for the CIMB Bank websites (www.cimbclicks.com.my or www.cimb.com.my)

When you see any website with .cc links, be wary because the .CC domains are registered in the Cocos (Keeling) Islands – an Australian territory of only 14 km², with only about 600 inhabitants.

Warning Sign #4 : No Personal Login Phrase / Picture

To avoid phishing attacks, banks now give you a secret response (like a picture or a phrase) to confirm that you are visiting their legitimate website.

If the website you are visiting gives you the wrong picture or secret phrase, you have been tricked into visiting a fake website designed to mimic the real bank website.

You should also remember that the bank website must show you secret picture or phrase right after you enter your login, but BEFORE you key in your password.

If you are asked to key in your password without the website displaying the secret phrase or picture, you have been tricked into visiting a fake website designed to mimic the real bank website.

 

CIMB Advice To Protect Against Fake SMS / Email Scams

Here is a list of DOs and DON’Ts to protect yourself against fake SMS / email scams.

Please DO follow these good practices

  1. Pay attention to your transaction alerts and check your account activities regularly. In case of any unusual activity, please contact us immediately.
  2. If you wish to contact us, ONLY call the number on the back of your card or refer to CIMB website “Contact Us” page.
  3. Always check the URL of the website that you are making purchases from. Ensure  the “lock” icon or “https” appears on the website’s address bar.
  4. Always find a reputable seller on online marketplaces by searching for reviews from other customers to know their experience.
  5. To access CIMB Clicks, type the entire URL as follows: www.cimbclicks.com.my
  6. Always remember to log out once you have completed your banking transactions.

Please DO NOT follow these bad practices

  1. Don’t panic and give personal information to fraudsters impersonating representatives of government agencies etc. even if they deploy fear tactics. Immediately call the number on the back of your card to verify with CIMB.
  2. Never apply for personal financing through unverified links or individuals promising a lower rate. CIMB does not impose any application charges for personal financing applications.
  3. Never take instructions from anyone to change the mobile number in CIMB records to any number other than your own mobile number.
  4. When transacting online, never continue with a purchase if you have any doubts if the seller is not genuine.
  5. Never share details such as your card number / User ID / PIN / password / TAC  with anyone or key them in in any website other than CIMB Clicks.
    (Note: CIMB will never ask for  your ‘User ID’, ‘Password’ or ‘TAC’ under any circumstances outside of CIMB Clicks).
  6. Do not click on links or open email attachments from unknown / unreliable senders / sources.
    (Note: Emails from CIMB will always end with @cimb.com such as cimb.marketing@cimb.com

 

Recommended Reading

Go Back To > Cybersecurity | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Is First Woman To Get COVID-19 Vaccine In Critical Condition?

Is Margaret Keenan, the first woman to receive the Pfizer COVID-19 vaccine, in critical condition after developing an inflammation of the spinal cord?

Find out what happened, and what the facts really are!

 

Margaret Keenan : First Woman To Get COVID-19 Vaccine

On 8 December 2020, Margaret Keenan entered the history books as the first person in the world to receive a COVID-19 vaccine outside of clinical trials.

At 6:45 AM, a nurse injected her 90 year-old grandmother’s arm with the Pfizer-BioNTech mRNA vaccine.

It was such a momentous occasion, her vial and syringe will join the Science Museum Group Collection in South Kensington, London. The Museum is planning to put the vial on display at the “Medicine: The Wellcome Galleries” in early 2021.

 

Is First Woman To Get COVID-19 Vaccine In Critical Condition?

Soon after, people began sharing claims that Margaret Keenan is in critical condition after receiving her COVID-19 vaccination. Here is one example :

Update- Now the first woman to recieve covid-19 vaccine in the UK is in critical condition. Margaret Keenan 90, was of the first to receive the covid-19 vaccine earlier yesterday, and now it would appear that Margaret appears to have inflammation of the spinal chord, which is causing extreme neurological symptoms, possibly encephalitis

People also shared a screenshot of an article that appears to confirm that Margaret Keenan was in critical condition after receiving her COVID-19 vaccination.

Note : We added the HOAX overlay to prevent the screenshot from being further abused.

 

Margaret Keenan NOT In Critical Condition After Receiving COVID-19 Vaccine

All those posts about Margaret Keenan being in critical condition after receiving her COVID-19 vaccine are FALSE.

Yes, including the screenshot of that article above… and here are the reasons why.

Fact #1 : There Were No Complications With Her COVID-19 Vaccine

Margaret Keenan stayed in the hospital overnight and headed home on 9 December 2020. She suffered no complications from her COVID-19 vaccine.

In fact, she called the experience a “whirlwind“, saying that she felt “great“, and described the vaccination as “the best early birthday present” as she would be celebrating her 91st birthday on 16 December.

She also urged “everybody to get their vaccine as and when they are asked to do so.

COVENTRY, ENGLAND – DECEMBER 9: Margaret Keenan, 90, the first patient in the United Kingdom to receive the Pfizer/BioNtech covid-19 vaccine, leaves University Hospital Coventry & Warwickshire with grandson Conor (L) and daughter Sue (R), the day after receiving the first of two doses of the vaccine, on December 9, 2020 in Coventry, United Kingdom. The UK is the first country in the world to start vaccinating people with the Pfizer/BioNTech jab. (Photo by Jonny Weeks/The Guardian – Pool/Getty Images)

Fact #2 : The Article Is Fake

The screenshot of an article by Sam Weinberg is fake. There is no such article.

There is also no News and Engagement Editor called Sam Weinberg at any known publication.

If it at all exists, it is probably a page from one of the “satire” websites that create such fake stories for page views.

Fact #3 : The Transverse Myelitis Case Was For A Different Vaccine

While some (including the fake article) claimed that Margaret Keenan suffered from an inflammation of the spinal cord, others claimed she suffered from transverse myelitis.

It is likely that these Google University doctors confused the Pfizer-BioNTech mRNA vaccine with the adenovirus vaccine by Oxford-AstraZeneca. They are two completely different vaccines, using different methods.

In fact, some of them shared links to an article about a UK woman suffering from transverse myelitis – an inflammation of the spinal cord – during the AstraZeneca Phase 3 COVID-19 vaccine trial.

The Oxford-AstraZeneca vaccine – AZD1222 – uses an adenovirus as a vector for the SARS-CoV-2 spike protein.

The Pfizer-BioNTech vaccine – BNT162b2 – uses the new, and completely different mRNA technology to create the SARS-CoV-2 spike protein.

They are completely different vaccines…

 

Recommended Reading

Go Back To > Fact Checks | ScienceHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Did China Create This Amazing Female Dancing Robot?

Did China create this amazing female dancing robot for a dance show in Shanghai?

Watch the viral video for yourself, and find out what the FACTS really are!

 

Did China Create This Amazing Dancing Robot?

Here is the video that countless people have been sharing on social media and even on YouTube. It is often paired with a short explanation in (broken) English.

Can u believe that this female dancer is robot ? The dance was held in Shanghai n it lasted only 5 minutes but the queue was 4hrs n cost 499 Yuan!

It has surpassed Japan in complexity, and saw its perfect facial expressions. Send this video to everyone to watch, let us enjoy together…

 

Amazing Female Dancing Robot : The Truth

The agility and grace of this female dancing robot, and its facial expressions, are incredible.

The less gullible would point out that it is something you would only expect from a real human being, and they would be right.

Fact #1 : That Is A Video Of A WDSF Competition

That is actually a video clip from the 2018 World Dance Sport Federation Championship in Lithuania.

The initials WDSF (World Dance Sport Federation) can be seen, together with the recording date at the upper left corner of the video.

Fact #2 : The Dance Only Lasted A Minute

The dance in the video only lasted just over a minute, even though the accompanying fake message claimed it lasted for 5 minutes.

Fact #3 : Those Are Lithuanian Dance Champions

Both dancers are very human. In fact, they are Lithuanian dance champions Ieva Zukauskaite (female), and Evaldas Sodeika (male).

Fact #4 : 499 Yuan Was The Entry Price To Shanghai Disneyland

The fake story claimed that the ticket to watch this performance costs 499 Yuan – about US$73 / £55 / RM303. That would be ridiculously exorbitant for a short dance.

In truth, that was “copied” from the two earlier hoaxes (here and here) about robot dancers at the Shanghai Disneyland.

Even that was not accurate, because 499 Yuan was the cost of an entry ticket to the Shanghai Disneyland when it first opened in February 2016.

Since 6 June 2018, it has been priced at 399 Yuan (off-peak), 575 Yuan (peak) and 665 Yuan (peak holiday).

 

Why Would Someone Create This Fake Story?

With China’s aggressive foreign stance in recent years, it is not uncommon to see such fake stories being created and shared.

Some believe it’s part of a concerted attempt to burnish China’s image overseas.

Others believe the many fake stories are being created to drown out the negative coverage of China’s controversial Belt and Road Initiative, and their aggressive moves in the South China Sea.

Whatever the reasons may be, it is our duty as global citizens to stop the proliferation of such fake stories.

Please share this fact check with your friends, so they know the truth!

 

Recommended Reading

Go Back To > Fact Checks | Home

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Are Hackers Using Good Morning Messages To Hack You?

Are hackers using Good Morning videos, pictures and messages to hack your devices, and steal your data?

Find out what is happening, and what the FACTS really are!

 

Claim : Hackers Are Using Good Morning Messages To Hack You!

This post about Chinese hackers using Good Morning videos, pictures and messages to hack your devices, has gone viral on social media and WhatsApp :

Dear friends, please delete all welcome photos and videos in Good Morning format and the like. Read below the article to the end, which will be clear why I ask about it. From now on I will only send personally prepared greetings.

Read it all !!! Send this message urgently to as many friends as you can to stop the invasion.

Olga Nikolaevna Lawyer: Caution:
ATTENTION

For those who like to send Good Morning pictures! Good day! Good evening!

Do not send these “good” messages.

Today, Shanghai China International News sent SOS to all subscribers (this is the third reminder) that experts recommend: please do not send good morning, good night, pictures and videos,.
Reports show that hackers in China designed the images, the video is so beautiful to hide the phishing codes inside them, when everyone sends these messages, the hackers use your devices to steal personal information, such as bank card information and data to crack the phone.

It has been reported that more than 500,000 victims of fraud have already been deceived.

If you want to greet others, write your own message to protect yourself and your family and friends.

Important! Delete all greeting messages and pictures that you have on your phone for your own safety. If someone sent you such a picture, immediately remove it from the device. Malicious code takes time to deploy, so if you act immediately, no harm will be done.

Tell all your friends about this to prevent hacking.

Greet others by writing your own words, and send only images you create. The material you create yourself is completely safe. Please understand me correctly! All have credit cards attached to their phone. Everyone has a lot of contacts in their phones. You will create a threat not only to yourself, but to all the contacts that you have on your phones, your friends and acquaintances.
Take this very carefully! This is a harsh reality

ATTENTION !!!
Urgent information !!!

Some people have already restricted..!

 

Hackers Using Good Morning Messages To Hack You : Just Another Hoax!

Many of get blasted with Good Morning or Good Night messages every day from well-meaning friends and family.

While they are literally spam that clog up Facebook, Telegram and WhatsApp groups, they really do NOT allow hackers to hack your devices.

While it would be nice to see people stop this irritating practice, here are the reasons why Good Morning messages are harmless…

Fact #1 : Shanghai China International News Does Not Exist

The news organisation, Shanghai China International News, that was stated in the hoax does not exist.

Fact #2 : No Reports On Hackers Designing Good Morning Pictures + Videos

There are no reports on hackers from China or anywhere else creating these Good Morning pictures and videos.

In fact, they are mostly created by websites and Facebook pages for people to share, and hopefully attract new followers.

Fact #3 : No Fraud Involving Good Morning Messages

There has been no fraud involving Good Morning or even Good Night messages, videos or pictures.

Certainly, half a million victims of such a scam would have made front page news. Yet there is not a single report on even one case.

Fact #4 : Image-Based Malware Is Possible, But…

Digital steganography is a method by which secret messages and other data can be hidden in digital files, like a photo or a video, or even a music file.

It is also possible to embed malicious code within a Good Morning photo, but it won’t be a full-fledged malware that can execute by itself. At most, it can be used to hide the malware payload from antivirus scanners.

In January 2019, cybercriminals created an online advertisement with a script. The script itself would appear innocuous and pass any check.

However, the image itself has an “almost white” rectangle that is recognised by the script, triggering it to redirect the user to the cybercriminals’ website.

Once there, the victim is tricked into installing a Trojan disguised as an Adobe Flash Player update.

Fact #5 : Malicious Code Executes Immediately

If you accidentally download and trigger malware, it will execute immediately. It won’t wait, as the hoax message claims.

Deleting Good Morning or Good Night photos or videos will free up storage space in your phone, but it won’t prevent any malware from executing.

Also, most malware require some sort of action to trigger their execution. Generally (but not always), just downloading a malware won’t trigger it.

 

Recommended Reading

Go Back To > Cybersecurity | SoftwareHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


How Honeywell Is Helping Industries Tackle COVID-19!

Find out how Honeywell has pivoted to deliver new services and products that help critical industries tackle the COVID-19 pandemic!

 

How Honeywell Is Helping Industries Tackle COVID-19

Honeywell have long been a solution partner for critical industries, with over 100 years of global experience in various industries.

In an exclusive roundtable session, Norm L. Gilsdorf, President of Honeywell ASEAN, detailed how the COVID-19 pandemic has created a crisis for critical industries.

On the other hand, it offered Honeywell the opportunity to showcase their expertise in creating new solutions and products to meet the new challenges.

 

Honeywell Products + Services That Help Industries Tackle COVID-19

Honeywell have quickly pivoted to develop these new solutions and products to help critical industries In ASEAN countries and around the world better handle the challenges of the COVID-19 pandemic.

Honeywell UV Treatment System

The Honeywell UV Treatment System is a deep ultraviolet (UVC) sanitising system for airlines that significant reduces certain viruses and bacteria on airplane cabin surfaces.

It is roughly the size of the typical airline beverage cart, with arms that extend over the top of seats, to sweep the cabin with UVC light.

The Honeywell UV Treatment System can service an aircraft cabin in less than 10 minutes for just a few dollars per flight for midsize to large airline fleets.

Currently, several major airlines in the ASEAN region are testing this system on their aircraft.

Honeywell Healthy Building Solutions

The Honeywell Healthy Building Solutions are not new, but they go a long way to help companies protect their workforce from COVID-19.

By integrated air quality, safety and security technologies, they help to improve the health of building environments, operate more cleanly and safely, and help enforce social distancing policies.

The same technologies can also be employed in other public and commercial facilities like hospitals, airports, factories, educational institutions, etc. to enhance safety and compliance.

Honeywell Remote Industrial Solutions

The Honeywell Remote Industrial Solutions are being used by customers to handle COVID-19 related constraints and maintain business continuity, while protecting employees.

This software suite, which includes Experion Remote Operations, allow for remote management as well as work-from-home abilities for employees.

Honeywell Forge Cybersecurity Suite helps customers ensure business continuity in the face of mounting cyber threats, uncertain business conditions and supply chain disruptions.

Warehouse and logistics solutions help drive the exceptional growth of e-commerce in the ASEAN region and beyond, during the pandemic. They also support cold chain services for delivering medical products, including vaccines.

Other Honeywell Solutions That Help Against COVID-19

Other Honeywell solutions that help people and industries handle COVID-19 include :

  • Gas and flow sensors for ventilators, oxygen concentrators and respiratory machines;
  • Thermorebellion, a new temperature monitoring solution that incorporates advanced, infrared imaging technology and artificial intelligence algorithms to conduct non-invasive, preliminary screening of personnel entering facilities such as airports, hospitals and plants;
  • Dual layer face masks, personal safety packs and N95 masks.

 

COVID-19 : How To Keep Safe!

Here are a few simple steps to stay safe :

Recommended : Soap vs Sanitiser : Which Works Better Against COVID-19?
Recommended : Surgical Mask : How To CORRECTLY Wear + Remove!
Recommended : COVID-19 Food Safety : Fruits, Vegetables, Takeouts

 

Recommended Reading

Go Back To > Business | Cybersecurity | Home

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Kaspersky on APAC Digital Reputation Threats!

Vitaly Kamluk, Kaspersky Director of Global Research and Analysis for APAC, explores the impact of social media activities on our digital reputation, as well as those of brands and companies!

 

Digital Reputation : What Is It?

Digital reputation is the online version of good old fashion reputation. The only difference is that it is defined by our online behaviour and what people are saying about us, or the brand.

In short, our digital reputation is a combination of our digital footprint, and the impact it has on how other people perceive us, or the brand.

As the world becomes more connected, digital reputation is becoming more than just important – it is now critical to the future and success of any individual or corporation.

This has led to a shift in how people and brands behave online these days…

As Jesmond Chang, Head of Corporate Communications for Kaspersky APAC, shared above :

  • 32% of social media users in APAC use anonymous accounts
  • 50% of social media users in APAC avoid companies that are involved in a scandal, or had received negative news coverage online
  • 40% also stopped using a company’s or brand’s products once they are embroiled in some kind of online crisis.

 

Kaspersky on APAC Digital Reputation Threats!

At the 6th Vitaly Kamluk, Kaspersky Director of Global Research and Analysis for APAC, shared the latest threats to digital reputation in the APAC region, which is precipitated by the COVID-19 pandemic.

“One of the most visible effect of this pandemic is how it forced everyone, from individuals to the biggest companies, to shift a lot of their activities online.

This dependence, triggered by our need to secure our physical health, also pushed us to increase our social media use, either to connect with our distant loved ones, to give support to our community, to entertain ourselves, or to get hold of products and services that we need.

Parallel to this trend is the opening of wider doors for cybercriminals to exploit”

With many employees working from home, cybercriminals have found new ways to exploit this situation :

  • brute force attacks on database servers increased 23% in April 2020
  • Malicious files planted on websites increase 8% in April 2020
  • Network attacks and phishing emails also rose

Kaspersky themselves reported an increase of unique malware samples from 350,000 per day pre-COVID, to 428,000 per day!

With the increased reliance on online services, including remote work and learning, e-commerce purchases and a greater adoption of e-wallets, the 2020 threat landscape appears to favour cybercriminals.

 

Recommended Reading

Go Back To > Cybersecurity | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!


Fact Check : CMCO / PKPB Extended To 31 December 2020?

Was the CMCO / PKPB lockdown extended until 31 December 2020 by Malaysian Prime Minister Muhyiddin Yassin?

Find out what’s going on, and what the FACTS really are!

 

Claim : CMCO / PKPB Extended To 31 December 2020!

The viral claim consisted of a video of Malaysian Prime Minister Muhyiddin Yassin, with the message:

CMCO extended until 31/12

In the video, the Prime Minister appeared to announce that the CMCO / PKPB lockdown would be extended until 31 December 2020.

However, he was not talking about the CMCO / PKPB lockdown… so we placed the FALSE overlay to prevent further abuse.

 

No, CMCO / PKPB Was Not Extended To 31 December 2020

The video does indeed show Malaysian Prime Minister Muhyiddin Yassin announcing the extension of the lockdown to 31 December 2020.

However, this video was recorded much earlier, on 28 August 2020, when he announced the extension of the PKPP / RCMO to 31 December 2020, not PKPB / CMCO.

You can see RMCO (Recovery Movement Control Order) or PKPP (Perintah Kawalan Pergerakan Pemulihan) mentioned in the screenshot below.

The Malaysian Prime Minister is expected to announce an extension of the CMCO / PKPB lockdown later this week.

But the extension is expected to be for an additional 2 weeks – from 7 December until 20 December, not until 31 December 2020.

However, nothing is certain until the official announcement is made.

This is the second fake news about a lockdown extension today, after the PKPD / EMCO extension hoax.

 

RMCO / PKPP vs CMCO / PKPB : What’s The Difference?

Recovery MCO (RMCO or PKPP) is the most lenient form of lockdown during the COVID-19 pandemic, with greater liberalisation of the economy :

  1. Interstate travel is permitted, except to areas under Enhanced MCO (EMCO) or administrative restrictions.
  2. Barbers and hair salons are allowed to reopen, subject to SOP.
  3. Beauty parlours and nail salons are allowed to reopen, subject to SOP.
  4. Museums are allowed to reopen.
  5. Busking (indoor) and filming activities will be allowed.
  6. Meetings and workshops will be allowed.
  7. Morning / evening / night markets are allowed.
  8. Hawker stalls are allowed.
  9. Recreational fishing and commercial fisheries will be allowed.
  10. Gyms and snooker halls will be allowed.
  11. Non-contact sports like bowling, badminton, archery and shooting will be allowed.
  12. Outdoor group sports like kayaking and cycling will be allowed.
  13. Indoor sports like snooker, yoga, aerobics will be allowed.
  14. Malaysia’s borders remain closed, but local tourism will be allowed.
  15. Religious activities, like Hari Raya Aidiladha celebrations, will be allowed, subject to JAKIM’s SOP
  16. Schools will be reopened in stages throughout the RMCO, based on advice from the Ministry of Education.
  17. Places of worship will be allowed to reopen, subject to SOP
  18. Normal business operating hours to resume, with social distancing, hand washingface masks.

The current Conditional MCO (CMCO or PKPB) is less lenient, limiting interstate travel only for work and business purposes only, among other limitations :

  • Only two persons from each household are allowed to go out to purchase food supplies or daily necessities.
  • Only two persons from each household are allowed to dine-in at any restaurant / cafe.
  • No one is allowed to enter or leave the areas under CMCO lockdown.
  • Interstate travel is forbidden, except for work, economic or industrial purposes.
  • Supermarkets, shopping malls and retail stores are allowed, between 6 AM and 12 AM.
  • Restaurants, food stores, food trucks, hawkers, food courts, food stalls, food kiosks, groceries and convenience stores are allowed to open from 6 AM until 12 AM.
  • All public and private schools, institutions of higher learning, vocational training institutes, kindergartens, day care centres, tahfiz centres, public parks and recreation centres must close.
  • All seminars, workshops, courses, training, conferences, lectures and MICE (Meeting, Incentives, Conventions and Exhibitions) are forbidden.
  • All domestic tourism activities that cross into or out of the CMCO areas are forbidden.

For more details, please see Peninsular Malaysia : Official CMCO / PKPB SOP!

 

Recommended Reading

Go Back To > Fact Checks | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!

Fact Check : PKPD In Malaysia Extended To 3 January 2021?

The viral infographic claiming that the PKPD for eight states and federal territories in Malaysia was just extended to 3 January 2021 is FALSE.

Take a look at what just went viral on social media, and why it is just fake news!

 

Claim : PKPD in Malaysia Extended To 3 January 2021?

This was the infographic that went viral on social media today, 3 December 2020. We added the FALSE overlay to prevent further abuse.

It claimed that the PKPD (Perintah Kawalan Pergerakan Diperketatkan) or EMCO (Enhanced Movement Control Order) for these eight states and federal territories in Malaysia was just extended to 3 January 2021.

  • Selangor
  • Sabah
  • Labuan
  • Kuala Lumpur
  • Putrajaya
  • Perak
  • Terengganu
  • Pulau Pinang

 

PKPD In Malaysia Extended To 3 January 2021 : FAKE NEWS!

That infographic is fake and was edited from previous infographics released by the Malaysia National Security Council (MKN).

For the Doubting Thomases of the world who always ask, “How you know?”, here are the facts why…

Fact #1 : There Is No PKPD / EMCO Of Any State In Malaysia

There is no PKPD or EMCO covering an entire state or federal territory in Malaysia.

Only PKPB (Perintah Kawalan Pergerakan Bersyarat) or CMCO (Conditional Movement Control Order) exists for these seven states or federal territories :

  • North : Penang, Perak
  • East : Terengganu, Kelantan
  • Central : Selangor, Kuala Lumpur
  • South : Negeri Sembilan

Fact #2 : Labuan Is A Federal Territory

Labuan is always listed as WP Labuan in government infographics, because it is a federal territory, like Kuala Lumpur and Putrajaya.

Fact #3 : The Government Has Debunked It As Fake

The Malaysia National Security Council (MKN) has just publicly debunked the infographic as fake (with our English translation).

INI ADALAH PALSU!! Tak pasti jangan kongsi.

THIS IS FALSE!! Don’t share if not sure.

 

Recommended Reading

Go Back To > Fact Checks | BusinessHome

 

Support Tech ARP!

If you like our work, you can help support us by visiting our sponsors, participating in the Tech ARP Forums, or even donating to our fund. Any help you can render is greatly appreciated!